ie7 – Grey Panthers Savannah https://grey-panther.net Just another WordPress site Thu, 21 Dec 2006 06:33:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.2 206299117 I’m not a ‘lone bitter old man :) https://grey-panther.net/2006/12/im-not-a-lone-bitter-old-man.html https://grey-panther.net/2006/12/im-not-a-lone-bitter-old-man.html#respond Thu, 21 Dec 2006 06:33:00 +0000 https://grey-panther.net/?p=960 You might remember this post, where I was criticizing the so called vulnerability in Internet Explorer 7. Alex Eckelberry over at the SunbeltBLOG just came out with a post saying the exact same thing. While I don’t agree with many of his previous posts (like those about HIPSs and Patchguard), this one is spot on.

]]>
https://grey-panther.net/2006/12/im-not-a-lone-bitter-old-man.html/feed 0 960
Talking out of your head (as opposed to an other body part) https://grey-panther.net/2006/11/talking-out-of-your-head-as-opposed-to-an-other-body-part.html https://grey-panther.net/2006/11/talking-out-of-your-head-as-opposed-to-an-other-body-part.html#comments Fri, 03 Nov 2006 11:59:00 +0000 https://grey-panther.net/?p=1027 Recently a hoax / misinformation / hype is making its way around the web (or at least the part of the web I see ;)). I’m talking about the article title Internet Explorer 7 – Still Spyware Writers Heaven. While I’m by no means a MS fan and criticized the IE7 team for not making some features available under Win2K3 and WinXP, for which I believe that there is no sound technical explanation (only a marketing one), I must absolutely can’t stand misinformation, even more so when it seems that the author wants to generate hype!

This is exactly the case with this individual. He refers to a very old attack vector when creating a DLL with the same name as one that was loaded by the application resulted in loading the “malicious” DLL. As of WinXP SP2 (which everyone should have installed by now, otherwise your computer won’t last for 10 minutes on the Internet), the search order for DLLs is the following (taken from the official MS page):

  1. The directory from which the application loaded.
  2. The system directory.
  3. The 16-bit system directory.
  4. The Windows directory.
  5. The current directory.
  6. The directories that are listed in the PATH environment variable.

Now lets analyze this list from the point of view of IE. The current security settings on my IE folder (in program files) is the following: Administratos – Full Control, Power Users – Modify and Users – Read and Execute. In other words you can only create files there if you have at least power user privileges, but if malicious code runs at that level you are pretty much screwed anyway as you can do much more damage than that.

Now if you run as a normal user (which you should be!), your only hope is to write to a directory in the path (or alternatively change your path so that it includes a given directory). In this case the DLL would be loaded IF it couldn’t be found in any of the other places. This scenario is only possible if some application uninstalled itself and failed to remove the registry entry for the DLL.

To sum up:

  • This vulnerability has been fixed a couple of years ago (in WinXP SP2)
  • If you run your browser with high privileges, you don’t need this method to alter the system. It can be used to hide files, but then again if you have that high privileges you can directly install rootkits.
  • If you run with low privileges (as you should), the only attack would only be possible if you uninstalled a program which registered a BHO without referring with the full pathname to it and the uninstaller program deleted the dll, but failed to delete the registry entry. With other words: very, very unlikely.

My advice would be: run with low privileges (as user) and don’t read articles from people who don’t know what they’re talking about.

]]>
https://grey-panther.net/2006/11/talking-out-of-your-head-as-opposed-to-an-other-body-part.html/feed 5 1027
The IE7 team replies – sort of https://grey-panther.net/2006/10/the-ie7-team-replies-sort-of.html https://grey-panther.net/2006/10/the-ie7-team-replies-sort-of.html#comments Mon, 23 Oct 2006 12:45:00 +0000 https://grey-panther.net/?p=1030 As you might remember Martin McKey very generously offered his readers the chance to post questions which he will ask at the IE7 release party. Well, he went he asked and as I’ve predicted he got a canned response. I felt that this was partially he didn’t insist on it – and I can’t blame him because they had a lot of questions to ask and after all it wasn’t his question – and probably partially because I didn’t phrase the question clear enough (English not being my native language). Actually I suspect that event if he would have insisted he would have got some generic response. So here my question again and I challenge any IE7 technical team member to give me a technical reason (like we couldn’t do X with the current set of APIs) for not implementing the containment wall technology in pre-Vista Windows versions. As I understand it this technology is basically separating IE in multiple processes with each process a specific task (like rendering the page, talking to the net, etc) and each process drops the rights it doesn’t need, meaning that if you find a bug in the rendering code for example, you can’t exploit it in any meaningful because when you execute code in the context of the rendering process, you have almost zero privileges. If this is truly what this technology does, this is entirely possible with current versions of Windows, and I see no reason other than marketing for this move. (Actually I’m not deluding myself into thinking that anybody or anybody from Microsoft for that matter reads my blog, but it’s nice to let some steam out 😉 ).

Listen to the whole podcast

]]>
https://grey-panther.net/2006/10/the-ie7-team-replies-sort-of.html/feed 2 1030
Picking the brain of the IE7 team https://grey-panther.net/2006/10/picking-the-brain-of-the-ie7-team.html https://grey-panther.net/2006/10/picking-the-brain-of-the-ie7-team.html#comments Fri, 13 Oct 2006 11:46:00 +0000 https://grey-panther.net/?p=1039 Martin McKey over of at the Network Security Blog is going to meet the IE7 team and is waiting for proposals regarding the questions he should ask them. Here is mine:

First let me give a little background as I see it so that if they choose to answer my question (no offense, but if it is as I suspect, they are limited in their freedom of speech regarding this areas by NDAs and such) they can do so in the correct context. One of the biggest security advantages of IE7 is the so called containment wall, which if I understand correctly uses the x86/x64 architecture and the Windows NT security system to separate in different processes the different tasks the browser has, so that a lower privilege task can’t corrupt the memory of a higher privileged task. I think that this is a very robust solution which should reduce the attack surface considerably and I also can appreciate the work that most have gone into slicing up the application in parts. Now my question would be: is there any real technical reason for which this won’t be available under non-Vista versions of Windows? If possible name at least one API which this feature needs that is not available under non-Vista Windowses.. Because all of the mentioned techniques are available on all version of Windows from Win2K onwards (as for example the DropMyRigths tool written by Michael Howard demonstrates). I’m very curious if and what they’ll respond, but I have several possible scenarios in my mind: (a) I’ve misunderstood the feature and it’s really more or different from what I’ve described (moderately possible) (b) This is a marketing move which incorrectly puts revenue generating in front of security (this is my personal opinion, but I don’t think they will admit to it) or (c) my question won’t be asked at all.

]]>
https://grey-panther.net/2006/10/picking-the-brain-of-the-ie7-team.html/feed 1 1039
Bye-bye DHTML Editing https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html#respond Sun, 01 Oct 2006 19:24:00 +0000 https://grey-panther.net/?p=1066 While browsing on the MSDN website, the following article caught my eye: Replacing the DHTML Editing Control in Windows Vista and Beyond. It seems that starting with Windows Vista the fast and dirty way to add WYSIWYG editing to your web pages with IE won’t be available any more because the needed ActiveX component won’t be included in the distribution. It will still be downloadable optionally however. There are two migration paths for all of you using this feature (for either in-house or public sites): the MSHTML editor or one of the full featured cross-browser compatible alternatives.

Update: the guys over at the boagworld forum pointed out two more editors: DevEdit and Dojokit.

]]>
https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html/feed 0 1066