IE Download.Ject Exploit Fixed 421
Saint Aardvark writes "Just in time for the weekend, the
Internet Storm Center is reporting that Microsoft is providing
a fix for the Download.Ject vulnerability that hit IE late
last month. The press
statement says that it'll hit Windows Update later
today..."
FYI (Score:4, Informative)
In addition to this configuration change, which will protect customers against the immediate reported threats, Microsoft is working to provide a series of security updates to Internet Explorer in coming weeks that will provide additional protections for our customers.
Please note that this isnt a fix, it is only a configuration change to help defend against the problem and nullify the threat from the known places it is spreading from. No doubt that within a short time, whoever is behind the virus will find other places to have the virus attack from. This is just another "this will help for now, please wait for the real fix" incident from Microsoft.
Re:FYI (Score:5, Informative)
Critical Update for Microsoft Data Access Components - Disable ADODB.Stream object from Internet Explorer (KB870669)
Adodb.stream provides a method for reading and writing files on a hard drive.
Quick Info
File Name:
Windows-KB870669-x86-ENU.exe
Download Size:
104 KB
Date Published:
7/2/2004
Version:
870669
Overview
Adodb.stream provides a method for reading and writing files on a hard drive. This by-design functionality is sometimes used by web applications. However, when combined with known security vulnerabilities in Microsoft Internet Explorer, it could allow an internet web site to execute script from the Local Machine Zone (LMZ). This occurs because the ADODB.Stream object allows access to the hard drive when hosted within Internet Explorer.
It has nothing to do with known threats.
Re:FYI (Score:5, Funny)
Ah, once again, "Security Zones" rears its ugly head. Wasn't integrating the browser into the operating system a brilliant move?
Ah, once again, the assumption that users are using Web-based apps in a trusted environment such as the office LAN, rather than the Real World(tm), rears its ugly head. Services listening on 135? 137? 139? 445? 5000? But how will you share files, printers? Doesn't everyone want to share every file with every other user on their network segment? Doesn't everyone want to automatically sniff out and configure their machine to work with every network-attached peripheral?
This isn't chocolate and peanut butter. Executables and Web Content are not two great tastes that taste great together. Just because you can do something, doesn't mean you should.
Security "zones" are one of the dumbest fucking ideas ever to come down the pipe.
Heap Big Clue: Bug Fix. (Score:2)
My bad. Forgot to monosyllablize the heap big clue; there's no one-syllable word for "local internet zone", so...
"I.E. made of code. I.E. code run on your box. Since I.E. code run on your box, all zone known to I.E. are "SELF"!"
Re:FYI (Score:3, Interesting)
Re:FYI (Score:3)
Yes to the former. No to the latter -- but with the caveat that the thing that should be sandboxing code is the operating system, not the web browser.
A web browser is not an operating system. It has no business doing anything other than turning HTML into boobies.
> Microsoft's problem is that their API's are a mess and secur
Re:FYI (Score:3)
Not if it's sandboxed.
Tools that enable untrusted code to run in an unsandboxable environment are bad.
What makes an environment "unsandboxable"? We're not talking C code here, where you can access any object in memory if you know where in might be likely to reside. We're talking about scripting languages where you can only access the functionality provided by the API.
No to the latter -- but with the caveat that the thing that should be sandboxing code is t
Re:FYI (Score:4, Insightful)
follow along, because perhaps you're a clueless MS programmer and don't get it.
1) IE really is integrated into windows. Sure, delete that icon on the desktop, but the entire help system is based around IE, the email client is based around IE, in fact every feature of the GUI is based around IE. You can't swing a memory mapped file without hitting a couple of IE API's.
2) IE itself contains provisions called BHO's and ActiveX controls that let you add new functionality to IE.
3) Therefore if IE is part of the operating system, and IE can be significantly altered either in advertantly ("Hey buddy, click here to win 1 million dollars!") or through a buffer overflow or similar trick, then you've given untrusted code a relatively easy path to alter the core OS.
4) Lets go through this again, because you're slow.
5) IE is core to OS, IE can be easily corrupted by executables on the web, therefore, the core OS is subject to security breaches simply by a user browsing the web.
I don't know how to make this clearer. The things I've seen IE do to Windows XP in the past 4 weeks make my hair stand on end. A simple click by a friend, who tried to close a popup, missed by 1/4" and basically allowed an ActiveX control to run rampant, cost us an entire two days work.
* The virus protection saw the problem but wasn't fast enough to fix it
* Spybot S&D 1.3 with latest patches was *BLIND* to this infection
* SpySweeper was able to kill things off, but only after we disabled system restore because guess what, every new piece of malware hijacks system restore and the system continuously reinfects itself.
Lets step by and see what's happening.
By design, IE has set up the entire Windows OS so that one inadvertant click in a user process can completely corrupt the OS.
*AND ITS DONE ON PURPOSE*
Honest to god, if someone told me that MS was that stupid 10 years ago, I'd laugh. But I've seen it with my own eyes. IE is so awful that it should not be used. The US government now recommends you shouldn't use it.
I like Windows XP, but IE is fatally flawed and must be rewritten. But hey, its so integrated in the OS that guess what... you have to rewrite the OS.
Holy cow, open your eyes. Its BAD out there!
Re:FYI (Score:3)
Re:FYI (Score:5, Insightful)
I think I lost count at about 1000 when it comes to these "this will help for now..." When it comes to IE most fixes end up as patches that can actually break more than they fix. I think the Dept. of Homeland's Security recommendation of not using IE speaks loud and clear to this.
Microsoft could start but not allowing web sites to automatically run malicious code, just as Outlook has the same tendency with emails (which incidently, most email viruses spread rapidly with).Re:FYI (Score:5, Interesting)
First, to release a patch to a commercial application used by millions of people is inherently troublesome. You've got to make sure you test it thoroughly...because unlike Open Source, the liability is on YOU if people can't get their work done. If there is a change to an existing setting that can defray the effect of the vulnerability and give you more time to test, it would be remiss of you not to inform customers of it. Would you rather they ask customers to wait a few days until the patch is thoroughly QA'd?
Second, I have never -- that means NOT EVER -- seen an IE fix that broke my machine worse than a virus would. The fix might cause problems with IE, but it wouldn't cause my machine to send spam email against my will. And the VAST majority of IE fixes have had no ill effects whatsoever. On the other hand, emerging the latest from gentoo causes something to break a substantial percentage of the time.
I do agree that IE isn't the best browser ever, but this doesn't excuse you from putting blame where it doesn't belong. If you're going to fault Microsoft for anything, fault them for not being up front about the patch process. They should let us know at every step of the way what the problem is, how to patch it for now, when a fix will be ready and how to defray such bugs from allowing exploits in the future. That's one cue from OSS they'd be smart to heed. All software is buggy. Pretending it's not is tantemount to pretending you aren't going to fix it.
Re:FYI (Score:5, Insightful)
Now I call FUD on you. MS's EULA clearly states that they aren't liable for ANYTHING that their software does or does not do. Face the facts, IE is broken by design, and the only realistic alternative is to switch to another browser.
Re:FYI (Score:5, Insightful)
Oh, really now?
So where do I have to send my bill on lost work hours due to MS exploits to get a refund?
IE Patches no worse than viruses? (Score:5, Funny)
"Second, I have never -- that means NOT EVER -- seen an IE fix that broke my machine worse than a virus would."
Hmmm. Well THERE's a ringing endorsement....
I Demand the Editors Change the Title... (Score:2, Funny)
"Microsoft Kind of Does Something Vaguely Related to Download.Ject Exploit"
That reminds me... (Score:5, Funny)
Um (Score:3, Informative)
Re:Um (Score:5, Informative)
Re:Um (Score:2, Insightful)
While this is great for most home users, a lot of people (including myself) do not do this. I want to know exactly what is being put on my system. I don't need the Euro conversion utility. I don't need windows media player 9. Right now there are 8-10 things that it has wanted to install for over a year that I refuse to put on.
Re:Um (Score:5, Informative)
Autoupdate only installs "critical" patches. WM9 and the Euro tool are not such updates.
-sid
Re:Um (Score:3, Informative)
Re:Um (Score:3, Funny)
That assumes I remember to run Windows Update... Why do I have to do it myself Microsoft! I want automatic and forceful patch downloading and installation!
Second post:
I use Windows Update religiously and do not have the auto update feature running
Are you an idiot? Seriously.
Re:That reminds me... (Score:5, Interesting)
I, for one, do NOT look forward to the coming mandatory auto-patching, but I suppose it is inevitable with Microsoft.
Re:That reminds me... (Score:2)
You mean the random time like 3:00am that is listed in Automatic Updates by default, or some other random time that's selectable from the drop down box on when to check for and apply critical security patches automatically? I've been using this since it came out and have no problems, but then again, we don't really do anything complicated or mission critical with Microsoft s
Re:That reminds me... (Score:2)
Re:That reminds me... (Score:2)
I completely disagree. With proper measures, it can be done.
MS will never have a true 'forced patch upgrade' in 'thou shalt' terms. Enterprises will run away screaming. There are reasons you have development, and test environments for serious pieces of enterprise inf
Re:That reminds me... (Score:2)
Had the patch been automatically applied, it might be hours discovering WHY the system stopped working, then time spent figuring out whether or not the patch could be rolled back (remember, some MS patches are ONE WAY!), then rolling it back... Assuming it didn't corrupt your data along the way.
Autopatching is likely to become the wave of the future, but I hope Microsoft allows you to manually override it. Maybe they can make it pop up a modal dialog
Re:That reminds me... (Score:2)
Are you serious about wanting forced, automatic downloading ? Do you REALLY want to give Microsoft full control to change things without your permission ? What happens when you log on and MS "Fixed" IE by not letting Mozilla/FF load ? How about "fixing" MS Office, by blocking Open Office ? I am not a tinfoil hatter, or and MS hater, but I like to decide what/when gets updated on my machine. As an example, I have an old, DRM free version of M
Re:That reminds me... (Score:2, Interesting)
Problem: he is a dial up user and is never connected long enough at home to keep his system current.
So Windows will have to hi-jack the internet connection in order to get the downloads or half-knowlegdable users like this guy will still be victims.
Re:That reminds me... (Score:2)
Re:That reminds me... (Score:3, Informative)
One down, ??? to go (Score:2, Informative)
Got it, but.. (Score:5, Insightful)
Re:Got it, but.. (Score:3, Interesting)
What? Like sites that do not function if they can't open a thousand windows? or can't force you to agree to download and install something without crashing the browser? (insert zillions of other annoying or dangerous exploits here)
If a site REQUIRES Internet Explorer perhaps you shouldn't go there. I mean now that the Department of Homeland Security is urging people not to use IE, Your bank better think real hard about requiring you to use it.
Re:Got it, but.. (Score:3, Interesting)
Re:Got it, but.. (Score:3, Interesting)
Someone tried to make a database as a Sr. project that needed some sort of info from the official enrolled student database, I forget exactly what but it wasn't even anything specific,
Re:Got it, but.. (Score:4, Insightful)
not a troll (Score:2)
Hitting reload a couple times fixes it.
Re:not a troll (Score:4, Informative)
Re:not a troll (Score:3, Informative)
If you want to complain, complain about Seamonkey. It suffers from the same bug, yet is at version 1.7.
Oh, and btw, [Ctrl +] (optionally, followed quickly by [Ctrl -]) will cause the page to re-render and disp
Re:Got it, but.. (Score:3, Informative)
jaz
Re:Got it, but.. (Score:3, Informative)
Instead of disallowing DoubleClick cookies, edit your hosts file to change the address for the DoubleClick sites. These are the relevant ones that I've got in my hosts file--YMMV.
Re:Got it, but.. (Score:2)
Re:Got it, but.. (Score:2)
Get the fix early here. (Score:2, Funny)
O get the fix early, HERE. [mozilla.org]
Re:Get the fix early here. (Score:2)
Just got my WindowsUpdate popup a minute ago (Score:2)
What's still frustrating is the amount of time between the identification of a vulnerability and the time a real patch is released. A real patch, not just some KB article telling you to edit the registry.
Re:Just got my WindowsUpdate popup a minute ago (Score:2)
The really unfortunate part of all this is that you can run a configuration like I do - treat all of internet as "restricted", disallow all scripting, don't trust any downloads - and not be vulnerable to something like this. My system's configuration requires that I tag windowsupdate.microsoft.com as a "trusted" site in order to get updates!
But it means that hundreds of common websites stop working. Microsoft decided to join the contr
Obvious link missing (Score:2, Funny)
In Other News... (Score:5, Funny)
Re:In Other News... (Score:5, Interesting)
Can somebody at DoHS recommend switching to another browser every day so MS will start working on the backlog of bugs?
Another question: Are there enough of those high-flying MS developers still working on the IE codebase to make the changes in a timely manner or is there an aging skeletton crew to fix the vulnerabilities, not too motivated since they were passed up for work on
I wonder.
Somebody probably lit the proverbial fire under their bums this morning.
(They know how hard it is to get people to switch browsers. It took a while (2 years) with Netscape, and NS Communicator was a POS). I guess they are at the edge of the cliff and realized there's nowhere but down.
Re:In Other News... (Score:2)
It is this very reason why I am so opposed to the patriot act. It gave to Homeland and to DOJ most of the same capabilities as NSA and CIA had together. NSA/CIA are far less political th
Re:In Other News... (Score:2)
Kind of. It actually proved that it is difficult to function as a government. You see, as a government, you CANNOT just have biased opinions, even if those biases are based in experience. It has to run on fact, or at least what qualifies as fact.
The "fact" is that Windows has much better government certification than Linux. We know that government certific
Re:In Other News... (Score:2)
That's when I banned IE and Outlook at work. Did wonders for our security, and made me look really good when other groups and companies got hammered by Melissa and her zombie children.
Re:In Other News... (Score:2)
Not to say it's not woking out for you, just venting pent-up frustrations
The Vulnerability (Score:5, Funny)
So, the vulnerability will hit Windows Update later today? How do they know? (Other than the fact that Microsoft is running security at the Windows Update site, of course.)
Re:The Vulnerability (Score:2)
Such problems are always timed to coincide with 3 day weekends.
Always.
-Adam
All right!!! (Score:5, Funny)
Excellent timing.
Re:All right!!! (Score:2)
The update is already available and I've already pushed it out to all of my machines without issue.
Re:All right!!! (Score:2)
After Blaster I said Screw that and built an Software Update Server on our network here. All I had to do was forcibly sync it, approve the update and away it goes.
All I have to do is wait, and check the logs (using suslogvewer) on monday to make sure that they updated.
Re:All right!!! (Score:2)
Loaded terminology... (Score:5, Insightful)
vs.
"A week or so ago"
I know Microsoft is not one for timely updates, but this wording makes it sound like Microsoft has been sitting on this particular problem a lot longer than they have.
Re:Loaded terminology... (Score:2)
I know Microsoft is not one for timely updates, but this wording makes it sound like Microsoft has been sitting on this particular problem a lot longer than they have.
To steal an oft-used cliche of the "Linux fanboys":
You must be new here.
Oh, and I figgered I'd not be a looser and mispell something just two make it offishul:Nataly Portman.
Re:Loaded terminology... (Score:2)
I don't know the answers myself, because I have given up caring about MSIE security holes. The thing _is_ a security hole.
Re:Loaded terminology... (Score:2)
What about ActiveX? (Score:4, Informative)
late last month means (Score:5, Insightful)
Re:late last month means (Score:2)
Why Ject? (Score:2, Interesting)
Re:Why Ject? (Score:2)
"Is the virus writer," he conjectured," or the AV firm some kind of closet Final Fantasy X fan?"
"Seriously?" he objected
"Why Ject?" he said dejectedly.
Probably because you weren't projecting your rejection at the time. But more likely due to the fact that it feels uncommon in the English language, but practically falls off the tongue and so is easy to remember. (sorry, I couldn't easily inject abject)
-Adam
I think my brain just exploded. (Score:2, Funny)
Coming soon... (Score:5, Funny)
Download.Ject.B
Download.Ject.C
Download.Ject.D..............
Where is the notice? (Score:2)
I looked on the US-CERT website but could not find it.
thanks
Re:Where is the notice? (Score:2, Informative)
HERE Re:Where is the notice? (Score:3, Informative)
"Use a different web browser
There are a number of significant vulnerabilities in technologies relating to the IE domain/zone security model, the DHTML object model, MIME type determination, and ActiveX. It is possible to reduce exposure to these vulnerabilities by using a different web browser, especially when browsing untrusted sites. Such a decision may, however, reduce the functionality of sites that require IE-specific features such as DHTML, VBScript, and ActiveX.
IE Features (Score:5, Insightful)
ActiveX should never have been embedded into a browser in the way it has been. Yet most of the sites that I have to use IE for is because of ActiveX controls.
Microsoft tricked a lot of the world into using ActiveX and now they're paying the price.
I can hear the support conversations already -
"Yes, if your security zone is set to high your computer won't be vulnerable. But if you want to view anything with ActiveX (read: multimedia) you'll have to turn these vulnerabilities back on."
Does anyone else find this mildly insane ?
Microsoft released a fix a long time ago (Score:5, Informative)
Wonder no more. 11 months of IE exploits and at least a year or two's worth of future exploits can be avoided with one simple registry change [microsoft.com]. The problem that MS has isn't that they are incompetent, it's that they insist on leaving default features that are used by 1% of administrators like myself.
98% of spyware released since January 2004 can be avoided with the above registry fix. If you think that statistic is outrageous, I challenge you to find one piece of malware installed without using ADODB.Stream in one way, shape, or form. Be forewarned, I make and research IE exploits for a living and wouldn't make this kind of a claim without having the data to back it up.
Re:Microsoft released a fix a long time ago (Score:2)
The bonus about this program is that it doesn't run resident in memory. It just changes some regkeys and the hosts file to confuse/prevent spyware from running. Installing/uninstalling changes are just a click away, too.
Re:Microsoft released a fix a long time ago (Score:3, Informative)
Re:Microsoft released a fix a long time ago (Score:4, Informative)
The registry change you point to only affects the ADODB.Stream object. While holes involving ADODB.Stream may have made up a large porportion of successful exploits by spyware (as you claim), there have been other arbitrary-code-execution vulnerabilities in Internet Explorer during the time period you mention.
I'm guessing that there have been several zone-jumping holes, and ADODB.Stream makes all zone-jumping holes into arbitrary-code-execution holes. Is that what you mean by "using ADODB.Stream in one way, shape, or form"?
I make and research IE exploits for a living and wouldn't make this kind of a claim without having the data to back it up.
I find and fix Mozilla security holes as a hobby and I think you're making stuff up.
Re:If parent is true, please mod up! (Score:3, Funny)
I'm not exactly the most trustworthy person anyway, I've been compromising computers for the last 5 years.
Yippee! (Score:5, Interesting)
And, while it's unfortunate that many people don't (or can't) run Windows Update, it works well for people with fast connections who are behind firewalls so their systems don't get screwed up before they can patch them!
Re:Yippee! (Score:5, Insightful)
It was less than a week, wasn't it?
Nope [netcraft.com]
I'm already patched! (Score:5, Funny)
Is this just coincidence? (Score:4, Interesting)
Dear Microsoft, (Score:5, Funny)
I am writing concerning downloading the most recent Windows Updates. I am unable to obtain them as your site requires IE, and the government recently suggested that users cease use of IE.
Please help!
-Adam
Fix not available yet (Score:3, Informative)
I know of at least two very large companies who have moved to Firefox in the wake of this latest episode. I suspect many people are finally fed up, which has prompted MS to announce patches before they're even available.
Considering a recent patch to fix a vulnerability broke the complaince of IE as it relates to embedded uids/pws in URLs, I wouldn't be surprised if this "fix" ends up crippling something else.
We should start collecting wagers on what new problems this upcoming "fix" introduces. Otherwise it would probably be online by now.
Attack and solution known since Aug. 2003 (Score:5, Interesting)
FullDisclosure: ADODB.Stream object [seclists.org]
Any attack vector that relies on an ActiveX control can be stopped by setting the killbit. This is IE security 101.
-weld
IE Download.Ject Exploit *not* fixed (Score:5, Informative)
No security vulnerabilities have actually been fixed here; all that's happened is that some functionality (which exacerbated existing security holes and was probably a bad idea to begin with) has been disabled.
Security and MS "Getting it" (Score:5, Interesting)
When MS started its rise to the top, they hired as many of the brightest minds as they could to make their software the best of class. While many of us probably find the corner-cutting a bit too much to take, it is possible to have both world-class software while meeting a marketing deadline. It happens, but less frequently than MS or its defenders/supporters would like to think it does (lightning striking the same point twice *without* a lightning rod).
They continued to compete heavily in the OS market despite the fact that they initially wanted to be nothing more than a computer language business. The OS was to be the cash cow that would allow them to be a more effective language business. But now they own the OS business and are driving their business model into other ventures (consoles, entertainment centers, telephones, automotive brainboxes, etc). They just follow the same formula that lead to their smashing success in moving into the OS and office app market: buy the best brains in the field and use their project management skills and VOILA!, they are the new masters of the [insert market segment].
But consider the sandbox their bright minds play in: a homogeneous computing environment with computer scientists guarding the facility from outside intrusion. As has been noted in another slashdot article [slashdot.org], Microsoft's products work wonderfully inside of Microsoft's campus.
They have extremely talented people working with the highest-end equipment in an environment where everything works nearly 100% of the time. Is it so surprising that they do not view the world the way we do?
After all, most of the companies that I have worked for are staffed with (largely) computer-illiterate people and whose firewall is maintained by a PFY with a high-school diploma.
Perhaps it would be better for Microsoft if they force their developers to create their products in environments that their customers use. In fact, maybe they should send their developers to test their products in the heterogeneous environments of their customers for a month or two.
Let them work the bugs out on their time for a change.
Windows 9x and Windows ME users still vulnerable? (Score:4, Informative)
It does NOT run on Windows 98.
Oh, I remember, Microsoft only produces patches for "supported" (if that's what you can call it) products.
Re:Windows 9x and Windows ME users still vulnerabl (Score:3, Informative)
Re:Windows 9x and Windows ME users still vulnerabl (Score:3, Interesting)
At the risk of repeating myself, Microsoft STILL hasn't got it.
Re:NOT an actual fix (Score:3, Interesting)
Re:NOT an actual fix (Score:2)
Obligatory Monty Python quote (Score:3, Funny)
Black Knight: Have at you.
King Arthur: You are indeed brave, sir knight, but the fight is mine.
Black Knight: Oh, had enough eh?
King Arthur: Look, you stupid bastard. You've got no arms left.
Black Knight: Yes I have.
King Arthur: Look.
Black Knight: Just a flesh wound.
Re:I have a feeling (Score:2, Insightful)
I am sure you are all aware that windows is a fairly large OS that is designed to be easy to use for novices but allow Power Users to do their thing as well. I think it accomplishes that fairly well. They provide automatic updates to every computer now (if you are not too lazy to turn it on). I realize that this option is turned off by default but this is more b
Re:I have a feeling (Score:2)
Re:I have a feeling (Score:3, Interesting)
It's worse than that. MS only appears to care about big customers, typically large corporations, institutes, and government departments. i.e places that are behind a firewall and have (nominally) competent IT staff to keep the network running smoothly. Just look at the number of TCP/UDP ports they keep open. That sort of behaviour is ok on a safe intranet, but it's sheer negligence for home users connected directly to the internet. I'm constantly seeing incoming requests to the "windows networking" ports (
Re:48 Hours (Score:4, Informative)
He is referring to this Security Focus article [securityfocus.com]
From the article,
Still, speaking at a press conference here Monday, Gates told journalists that Microsoft's patching process compares well with competitors'. "You know, the time -- the average time -- to fix on an operating system other than Windows is typically ninety to a hundred days," said Gates. "Today we have that down to less than forty-eight hours."
I already posted link to this article here [slashdot.org]