Microsoft Security Bulletins Coverage (Dec 15, 2010)

SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of December, 2010. A list of issues reported, along with SonicWALL coverage information follows:

MS10-090 Cumulative Security Update for Internet Explorer (2416400)

  • CVE-2010-3340 – HTML Object Memory Corruption Vulnerability
    IPS 6090 MS IE HTML Object Memory Corruption 1 (MS10-090)
  • CVE-2010-3342 – Cross-Domain Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3343 – HTML Object Memory Corruption Vulnerability
    IPS 6091 MS IE HTML Object Memory Corruption 2 (MS10-090)
  • CVE-2010-3345 – HTML Element Memory Corruption Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.
  • CVE-2010-3346 – HTML Element Memory Corruption Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.
  • CVE-2010-3348 – Cross-Domain Information Disclosure Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3962 – Uninitialized Memory Corruption Vulnerability
    IPS 5908 Malicious HTML Style Tag 1
    IPS 5943 MS IE Invalid Flag Reference Memory Corruption 1

MS10-091 Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)

  • CVE-2010-3956 – OpenType Font Index Vulnerability
    IPS 6087 Malicious Font File 7b
  • CVE-2010-3957 – OpenType Font Double Free Vulnerability
    IPS 6088 Malicious Font File 8b
  • CVE-2010-3959 – OpenType CMAP Table Vulnerability
    IPS 6089 Malicious Font File 9b

MS10-092 Vulnerability in Task Scheduler Could Allow Elevation of Privilege (2305420)

  • CVE-2010-3338 – Task Scheduler Vulnerability
    Note: Local elevation of privilege.

MS10-093 Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (2424434)

  • CVE-2010-3967 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-094 Vulnerability in Windows Media Encoder Could Allow Remote Code Execution (2447961)

  • CVE-2010-3965 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-095 Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2385678)

  • CVE-2010-3966 – BranchCache Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-096 Vulnerability in Windows Address Book Could Allow Remote Code Execution (2423089)

  • CVE-2010-3147 – Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-097 Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105)

  • CVE-2010-3144 – Internet Connection Signup Wizard Insecure Library Loading Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-098 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673)

  • CVE-2010-3939 – Win32k Buffer Overflow Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3940 – Win32k PFE Pointer Double Free Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3941 – Win32k Double Free Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3942 – Win32k WriteAV Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3943 – Win32k Cursor Linking Vulnerability
    Note: Local elevation of privilege.
  • CVE-2010-3944 – Win32k Memory Corruption Vulnerability
    Note: Local elevation of privilege.

MS10-099 Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591)

  • CVE-2010-3963 – Kernel NDProxy Buffer Overflow Vulnerability
    Note: Local elevation of privilege.

MS10-100 Vulnerability in Consent User Interface Could Allow Elevation of Privilege
(2442962)

  • CVE-2010-3961 – Consent UI Impersonation Vulnerability
    Note: Local elevation of privilege.

MS10-101 Vulnerability in Windows Netlogon Service Could Allow Denial of Service (2207559)

  • CVE-2010-2742 – Netlogon RPC Null dereference DOS Vulnerability
    IPS 6086 MS Windows Netlogon Service DoS

MS10-102 Vulnerability in Hyper-V Could Allow Denial of Service (2345316)

  • CVE-2010-3960 – Hyper-V VMBus Vulnerability
    Note: It is not feasible to detect the attacks at gateway level.

MS10-103 Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2292970)

  • CVE-2010-2569 – Size Value Heap Corruption in pubconv.dll Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-2570 – Heap Overrun in pubconv.dll Vulnerability
    IPS 6084 Malicious Publisher Document 1b
  • CVE-2010-2571 – Memory Corruption Due To Invalid Index Into Array in Pubconv.dll Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3954 – Microsoft Publisher Memory Corruption Vulnerability
    Note: There are no known public exploits targeting this vulnerability.
  • CVE-2010-3955 – Array Indexing Memory Corruption Vulnerability
    IPS 6085 Malicious Publisher Document 2b

MS10-104 Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution (2455005)

  • CVE-2010-3964 – Malformed Request Code Execution Vulnerability
    IPS 6083 MS SharePoint Malformed Request 1b

MS10-105 Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095)

  • CVE-2010-3945 – CGM Image Converter Buffer Overrun Vulnerability
    IPS 6077 Malicious Image File 1b
  • CVE-2010-3946 – PICT Image Converter Integer Overflow Vulnerability
    IPS 6078 Malicious Image File 2b
  • CVE-2010-3947 – TIFF Image Converter Heap Overflow Vulnerability
    IPS 6079 Malicious Image File 3b
  • CVE-2010-3949 – TIFF Image Converter Buffer Overflow Vulnerability
    IPS 6080 Malicious Image File 4b
  • CVE-2010-3950 – TIFF Image Converter Memory Corruption Vulnerability
    IPS 6080 Malicious Image File 4b
  • CVE-2010-3951 – FlashPix Image Converter Buffer Overflow Vulnerability
    IPS 6081 Malicious Image File 5b
  • CVE-2010-3952 – FlashPix Image Converter Heap Corruption Vulnerability
    IPS 6082 Malicious Image File 6b

MS10-106 Vulnerability in Microsoft Exchange Server Could Allow Denial of Service (2407132)

  • CVE-2010-3937 – Exchange Server Infinite Loop Vulnerability
    Note: There are no known public exploits targeting this vulnerability.

HP OpenView MMD Service Stack BO (Dec 10, 2010)

HP OpenView Storage Data Protector is a backup solution for enterprise and distributed environments. It consists of a Cell Manager, backup agents, and backup device servers. The Cell Manager is the central point from which backup agents and device servers are administered, and backup and restore operations are controlled.

The Media Management Daemon service runs on the Cell Manager and controls media management and device operations. It provides features such as protection against accidental overwrites, capability of transferring all media-related catalog from one Cell Manager to another, tracking of all media including the status of each medium, etc. The server listens for incoming connections on a dynamically assigned TCP port. The protocol utilized for communication between Media Management Daemon service and clients is proprietary and not documented.

A request sent to the Media Management Daemon service has the following format:

 Offset             Size      Field     -----------------  --------- ------------------------------ 0x0000             4         Command Length 0x0004             2         Unknown  0x0006             N1        Command code unicode string 0x0006+N1          2         0x2000 0x0008+N1          N2        Unicode string 0x0008+N1+N2       2         0x2000 0x000A+N1+N2       N3        Unicode string 0x000A+N1+N2+N3    2         0x2000 0x000E+N1+N2+N3    N4        Unicode string 0x0010+N1+N2+N3+.. 

Command Length is a 4 byte value in big endian byte order. It specifies the number of bytes inside the packet, excluding the length field itself. The arguments are in the form of wide char strings terminated with double Null bytes, and separated by one Unicode space character. The backup agent executes different programs based on the received Command code.

A code execution vulnerability exists in HP Data Protector Manager Server. The flaw is due to a stack buffer overflow during parsing of malformed requests. If a request with a certain command code is sent, the vulnerable code allocates a fixed-size buffer of 624 bytes. The 7th user-supplied argument is then copied into the destination buffer without any verification of its length. By supplying an overly long string in a crafted request, the destination stack buffer can be overflowed. The overflow could result in the overwriting of critical stack data such as stored function return addresses and SEH pointers, allowing for code injection and execution.

A remote unauthenticated attacker can exploit this vulnerability by sending a malicious request to a target server. Successful exploitation could result in execution of arbitrary code within the security context of the service, which is configured during the software installation (usually Administrator).

SonicWALL has in place numerous generic IPS signatures that detect and block shell code transferred in exploitation attempts of vulnerabilities of this type. A known exploit targeting this vulnerability is currently being proactively caught by the following IPS signature:

  • 5512 – Generic Server Application Shellcode Exploit 28

Gbot Trojan (Dec 09, 2010)

SonicWALL UTM Research team received reports of a new Trojan that can be used to relay sensitive information to remote hosts and accept remote commands from an attacker. The Trojan will make periodic GET and POST requests to remote servers for pages and files that do not exist. Some parts of the requests contain system information or is encrypted.

The Trojan performs the following activities upon execution:

  • Drops the following three files on the compromised machine:
    • C:Documents and SettingsUserApplication Datadwm.exe [ Detected as GAV: Cycbot.AA_6 (Trojan) ]
    • C:Documents and SettingsUserApplication DataMicrosoftconhost.exe [ Detected as GAV: Cycbot.AA_6 (Trojan) ]
    • C:Documents and SettingsUserApplication DataE6AE.A4A
  • Creates the following registry entries to ensure regular startup:
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon Shell “explorer.exe,C:Documents and SettingsUserApplication Datadwm.exe”
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun svchost “C:Documents and SettingsUserApplication DataMicrosoftconhost.exe”

  • Additional registry keys created:
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings ProxyServer “http=127.0.0.1:61333”

  • Samples of periodic web requests made by the Trojan:

    screenshot
    GET request to: freeonline{removed}.net
    /images/dating1.jpg?tq=gP4aKydUJoD%2BbLSpPM48HXAm%2BIp7RbMA%2Fj%2FBt%2F4rtL2W%2FTcjYNfHjHjmGehkmxM4tV0CLKqe6ul5HxkjOJVmFn2W7p6qiRuKM2cpy5wV
    67ZN5NyS3oiAzfBfnR82Oj6fiu%2Fhq0R50Za6gQOYeTN%2F3XLpS%2FuvwQ3f6llQ8jWyxwwpBg%2FcIwgI

    GET request to: 136{removed}.com
    /LB5000/CGI-BIN/s.cgi?tq=gHZutDyMv5rJej%2Fia9nrmsl6giWz%2BJZbVyA%3D

    GET request to: zon{removed}.com
    /images/im133.jpg?tq=gKZEtzyMv5rJqxG1J42pzMffBvAp1ujbwvgS917W65rJqlLfgPiWW1cg

    GET request to: pcdoc{removed}.com
    /images/logo-1.jpg?tq=gP4aKydMI5oGWaj6So61fGRfYz7KV8jMqwqKxVRWKZa7fLqVtLymA%2FOn9Itcm1zra2bubThHUef0bm2jztvHVcirw2XGuLsR5u3V%2BorIwuAZQROKs16%2BmEVT3jBx0lWjP%2
    FEmg95AmzFTI18yhLbz8fvGc5zFAt5MlTLKL4RY8T1KL7GEaXaQeV4tnf0paKcyB

    POST request to: xibu{removed}.cn
    /pics/23.jpg?type=g_v53&system={IE Browser Ver}|{OS Ver}|{Language}&id=B0CA268F7F02CA4AE6AE&status=err088_2_0&n=0&extra=0

SonicWALL Gateway AntiVirus provides protection against this threat via following signature:

GAV: Cycbot.AA_6 (Trojan)

Return of Zbot Spam (Dec 3, 2010)

SonicWALL UTM Research team received reports of a new variant of a Zbot worm spreading in the wild. This new variant is being spread through emails with links to the malicious file.

Below is the content of the e-mail:

Subject:

  • Your package has arrived!

Email Body:

    Dear client

    Your package has arrived.
    The tracking # is: 1Z45AR990283682749 and can be used at:

    [http://www.ups.com/tracking/tracking.html]

    The shipping invoice can be downloaded from :

    [http://www.ups.com/tracking/invoices/download.aspx?invoice_id=3483273]

    Thanks you,
    United Parcel Service

    *** This is an automatically generated email, please do not reply *** ===================================================

The e-mail message looks like below:

    screenshot
    ===================================================

The tracking number and the first link point to legitimate UPS website and resolve to a package for someone else. Although the package is for someone else, it tempts the user to click on the second link which leads to downloading of the Zbot executable.

Malicious link may lead to the following:

  • hxxp://th{REMOVED}.net/e107_files/cache/invoice.scr
  • hxxp://e1{REMOVED}dk/e107_files/cache/invoice.scr
  • hxxp://ed{REMOVED}om/e107_files/cache/invoice.scr
  • hxxp://www.su{REMOVED}at/e107_files/cache/invoice.scr
  • hxxp://www.s{REMOVED}nl/weblog/pm/images/invoice.scr

Once the user runs the downloaded file, it will perform the following activities:

File Operation:

Added Files

  • Documents and Settings{user}Application DataEszauxohxi.aqd – (5 KB)
  • Documents and Settings{user}Application DataUgarckesy.exe – (159 KB) [ Detected as GAV: Kryptik.IOL (Trojan) ]
  • *Note that the folders created can be different from other system.

Registry Operation:

Added Entries

  • HKEY_CURRENT_USERSoftwareMicrosoftIduwy Lowoo
  • Allows program to run without user notification:

  • KEY: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
    Value: {1BF5BAE0-A94B-EB99-7464-692B693EE661}
    Data:“Documents and Settings{user}Application DataUgarckesy.exe”
  • KEY: HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerPrivacy
    Value: CleanCookies
    Dword: 000000

Network Activity:

The following HTTP request was observed from this Worm:

  • www.mortga{REMOVED}nton.com

The Worm is also known as Win32/Spy.Zbot.YW [Eset], DR/Spy.ZBot.avew [Antivir] and Mal/Zbot-AV [Sophos]

SonicWALL Gateway AntiVirus provides protection against this Worm via GAV: Kryptik.IOL (Trojan) signature

MS IE CStyleSheetRule Array Memory Corruption (Dec 3, 2010)

Microsoft Internet Explorer (IE) is one of the most popular web browsers on the Internet. Internet Explorer is capable of rendering both static and dynamic web contents, such as DHTML. It can also be used to download files, play multi-media contents and open different file formats using various plug-ins.

IE supports the Document Object Model (DOM); a cross-platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents. The rules for programming and interacting with DOM are specified by the DOM Application Programming Interface (API). JScript and JavaScript can both be used by IE to access and modify a web page’s underlying DOM.

A separate mechanism, Cascading Style Sheets (CSS), exists to allow web page authors to control the style of a page. The CSS defines the look, and to some extent, the behavior, of HTML elements. The CSS language is human readable, and expresses styles in common desktop publishing terminology. Styles are generally stored within external Style Sheets so as to facilitate their easy reuse and modification. Styles can be stored in-line as well. The following example shows the use of styles: