Posts

Microsoft Remote Administration BO (March 29th, 2013)

Microsoft Computer Browser service is used to share information about workgroups, domains, and the hosts within them. This is an essential Windows service for hosts that wish to browse shared resources. The Browser protocol defines five primary roles for participating hosts: client, service provider, local master, domain master, and backup server. The protocol uses two protocols to transport data: the Microsoft Remote Administration Protocol (RAP), and the Remote Mailslot Protocol (RMP). RAP is used by a client to request and receive enumerations of services and servers from a Master or backup browser server. RMP is used for sending requests and replies between service providers, master, and backup servers. The communication can be targeted or by broadcast.

RAP commands are sent over the Server Message Block (SMB) Protocol. Before any RAP commands can be issued to a server, the client needs to establish an SMB connection with the it. Lists of servers can be obtained by using the NetServerEnum2 class of commands. The commands NetServerEnum2Request and NetServerEnum2Response belong to this class.

A NetServerEnum2Request is used by clients to retrieve lists of servers or machine groups. This message has the following structure:

 Offset   Size        Name                    Description -------- ----------- ----------------------- ----------------------------------------------------- 0x0000   2           errorcode 0x0002   2           converter 0x0004   2           entriesreturned         number of structures in the Data section 'x' 0x0006   2           entriesavailable        number of servers available 0x0008   x * len     RAPData                 'X' structures of 'len' length describing available services 

The RAPData section contains NetServerInfo structures. The format of these structures depends on other parameters in the NetServerEnum2Request. The structure of elements contained in RAPData is shown below:

 Offset   Size        Name                    Description -------- ----------- ----------------------- ----------------------------------------------------- 0x0000   16          servername              NetBIOS server name 0x0010   1           majorversion            major version 0x0011   1           minorversion            minor version 0x0012   4           servertype              type of services provided 0x0016   2           servercommentlow        absolute Offset from the start of RAPData to a string 0x0018   2           servercommenthigh 

The protocol specification states that multiple entries can be provided in a NetServerEnum2Response message. Each entry consists of a servername field and a servercommentlow field. Values of two fields are used to calculate the offset from the start of the RAPData block to a null-terminated ASCII string allocated in the response block. A heap buffer overflow flaw exists in the Microsoft Windows Browser Service when handling NetServerEnum2Response messages from a master browser. When two entries with the same servername are encountered in one response, the vulnerable code copies a value from the affected field to a fixed size heap buffer, expanding the string to wide characters without verifying the resulting string’s length. A carefully crafted malformed message will cause an overflow the buffer during this copy. This leads to heap memory corruption and could potentially lead to code injection and execution. Remote attackers can exploit this vulnerability by impersonating a master browser and providing a crafted response to a query for a resource. Successful exploitation could result in arbitrary code execution in the context of the logged in user.

Dell SonicWALL has existing signatures that detect suspicious CIFS traffic. One of these signatures has been shown to proactively detect and block an acquired exploit targeting this flaw.
The following IPS signature is proactively detecting exploit traffic exploiting this flaw:

  • 8483 – Suspicious CIFS Traffic 14

This vulnerability has been assigned CVE-2012-1852 by mitre.
The vendor has released an advisory addressing this issue.

Microsoft Security Bulletin Coverage (Aug 14, 2012)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of August, 2012. A list of issues reported, along with Dell SonicWALL coverage information follows:

MS12-052 Cumulative Security Update for Internet Explorer (2722913)

  • CVE-2012-1526 LayoutMemory Corruption Vulnerability
    IPS:8439 – Windows IE Layout Memory Corruption 4
  • CVE-2012-2521 Asynchronous NULL Object Access Remote Code Execution Vulnerability
    IPS:8442 – Suspicious HTML Style Tag 4
  • CVE-2012-2522 Virtual Function Table Corruption Remote Code Execution Vulnerability
    GAV: Malformed.html.MP.6
  • CVE-2012-2523 JavaScript Integer Overflow Remote Code Execution Vulnerability
    IPS:7645 – HTTP Client Shellcode Exploit 11a

MS12-053 Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)

  • CVE-2012-2526 Remote Desktop Protocol Vulnerability
    IPS:4198 – Suspicious RDP Traffic 8

MS12-054 Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)

  • CVE-2012-1850 Remote Administration Protocol Denial of Service Vulnerability
    IPS:8447 – Microsoft SMB Response Parsing Remote Code Execution (MS12-054) 3
  • CVE-2012-1851 Print Spooler Service Format String Vulnerability
    IPS:8446 – Windows Print Spooler Format String Exploit
    CVE-2012-1852 Remote Administration Protocol Heap Overflow Vulnerability
    IPS:8444 – Microsoft SMB Response Parsing Remote Code Execution (MS12-054) 2
  • CVE-2012-1853 Remote Administration Protocol Stack Overflow Vulnerability
    IPS:8443 – Microsoft SMB Response Parsing Remote Code Execution (MS12-054)

MS12-055 Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)

  • CVE-2012-2527 Win32k Use After Free Vulnerability
    Local EoP vulnerability, not covered

MS12-056 Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)

  • CVE-2012-2523 JavaScript Integer Overflow Remote Code Execution Vulnerability
    Please refer to MS12-052 above

MS12-057 Vulnerability inMicrosoft Office Could Allow for Remote Code Execution (2731879)

  • CVE-2012-2524 CGM File FormatMemory Corruption Vulnerability
    There is no public exploit available

MS12-058 Vulnerability inMicrosoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)

  • CVE-2012-2525 Oracle Outside In Libraries Remote Code Execution Vulnerability
    There is no details about this vulnerability

MS12-059 Vulnerability inMicrosoft Visio Could Allow Remote Code Execution (2733918)

  • CVE-2012-1888 Visio DXF File Format Buffer Overflow Vulnerability
    GAV: Malformed.dxf.MP.1

MS12-060 Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)

  • CVE-2012-1856 MSCOMCTL.OCX RCE Vulnerability
    GAV: Malformed.rtf.MP.2