ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [security-alerts] FW: [SA20061] Microsoft Windows "itss.dll" Heap Corruption Vulnerability



Dear Kazennov, Vladimir,

CHM  Файл  без  любого  переполнения буфера может выполнить код. Так что
фигня все это - опять как поломать самого себя.

--Wednesday, May 10, 2006, 4:24:33 PM, you wrote to 
security-alerts@xxxxxxxxxxxxxx:

>> 
>> TITLE:
>> Microsoft Windows "itss.dll" Heap Corruption Vulnerability
>> 
>> SECUNIA ADVISORY ID:
>> SA20061
>> 
>> VERIFY ADVISORY:
>> http://secunia.com/advisories/20061/
>> 
>> CRITICAL:
>> Less critical
>> 
>> IMPACT:
>> System access
>> 
>> WHERE:
>> From remote
>> 
>> OPERATING SYSTEM:
>> Microsoft Windows 2000 Advanced Server
>> http://secunia.com/product/21/
>> Microsoft Windows 2000 Datacenter Server
>> http://secunia.com/product/1177/
>> Microsoft Windows 2000 Professional
>> http://secunia.com/product/1/
>> Microsoft Windows 2000 Server
>> http://secunia.com/product/20/
>> Microsoft Windows XP Home Edition
>> http://secunia.com/product/16/
>> Microsoft Windows XP Professional
>> http://secunia.com/product/22/
>> 
>> DESCRIPTION:
>> RubИn Santamarta has discovered a vulnerability in Microsoft Windows,
>> which potentially can be exploited by malicious people to compromise a
>> user's system.
>> 
>> The vulnerability is caused due to a boundary error in the Infotech
>> Storage System Library (itss.dll) when reading a ".CHM" file. This
>> can be exploited to cause heap corruption and may allow arbitrary
>> code execution via a specially crafted ".CHM" file.
>> 
>> Successful exploitation requires that the user is e.g. tricked in
>> opening or decompiling a malicious ".CHM" file using "hh.exe".
>> 
>> The vulnerability has been confirmed in Windows XP SP2 (fully
>> patched) and also reported in Windows 2000 SP4. Other versions may
>> also be affected.
>> 
>> NOTE: The CHM file format should be considered insecure and treated
>> similar to an executable file. However, this vulnerability is
>> triggered even when the user decompiles the file without opening it.
>> 
>> SOLUTION:
>> The vulnerability will reportedly be fixed in the next Service Pack.
>> 
>> Do not open or decompile untrusted ".CHM" files.
>> 
>> PROVIDED AND/OR DISCOVERED BY:
>> RubИn Santamarta
>> 
>> ORIGINAL ADVISORY:
>> http://reversemode.com/index.php?option=com_content&task=view&;
>> id=11&Itemid=1
>> 
>> 



-- 
~/ZARAZA
Итак, я буду краток. (Твен)




 




Copyright © Lexa Software, 1996-2009.