Microsoft has issued a cumulative patch for Internet Explorer, which fixes multiple vulnerabilities. The worst vulnerability can lead to execution of arbitrary code on the client system via HTML emails or web sites.
1) A cross domain vulnerability exists in the way Internet Explorer retrieves files from the cache. This can be exploited by a malicious HTML document to execute arbitrary scripting in the "My Computer Zone".
2) Internet Explorer determines whether an object is safe when it interprets the file extension specified in the "Object Data" tag. This allows a malicious person to specify a "safe" file with eg. a ".html" extension in "Object Data", which causes Internet Explorer to interpret it as a "safe" file. However, when the file is retrieved by Internet Explorer the "Content-Type" header determines how the file will be treated. This allows an executable file like a ".hta" file to be treated as a "safe" file and be executed silently without restrictions.
NOTE: Further information has been released by http-equiv, proving that the patch from Microsoft is not adequate. Refer to solution section.
3) The Kill Bit will be set on the Windows Reporting Tool ActiveX control "BR549.DLL". This ActiveX control contains a vulnerability which could be exploited by malicious HTML documents to execute arbitrary code.
Furthermore, a language specific variant of the older object type tag buffer overflow vulnerability (MS03-020) has been identified and is fixed in this patch.
This update also fixes other minor issues.
The "Object Data" vulnerability is straight forward to exploit. In many ways this vulnerability is similar to MS01-020 which was exploited by notorious viruses like Nimda, Badtrans and Klez.
NOTE: Secunia has discovered exploitation of the "Object Data" vulnerability in the wild. Analysis shows that the exploit installs a program called ADPlus module or SurferBar, which is added to a users Internet Explorer and contains links to various porn sites. The exploit does the following:
1) User receives an email, which exploits the "Object Data" vulnerability.
2) The resource "a.cgi" is automatically requested from a webserver (188.8.131.52), which installs the file "drg.exe" in "C:\".
3) The file is then executed and saves the resource "surferbar.dll" from the same webserver as "win32.dll" (originally named "adplus.dll") in the "C:\\Program Files\" directory.
4) The file "win32.dll" is then executed by "regsvr32" and adds a bar to the user's Internet Explorer.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Microsoft Internet Explorer Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.