Posts

ISC BIND Denial of Service (Jun 30, 2011)

BIND is by far the most widely used DNS software on the Internet. It provides a platform that is fully compliant with published DNS standards.

The Domain Name System Security Extensions (DNSSEC) is a set of extensions to DNS which provide to DNS clients origin authentication of DNS data, authenticated denial of existence, and data integrity. Several DNS record types were created or adapted to use with DNSSEC:

  • RRSIG
  • DNSKEY
  • DS
  • NSEC
  • NSEC3
  • NSEC3PARAM

A vulnerability exists in the BIND’s implementation of RRSIG handler. An attacker can host a DNS server which sends malicious RRSIG records to other DNS servers. Successful exploitation would terminate the “named” (the BIND name server process) on the vulnerable DNS servers.

The vulnerability has been assigned as CVE-2011-1910.

SonicWALL has released an IPS signature to detect and block known exploits targeting this vulnerability. The following signature was released to address this issue:

  • 6790 – ISC BIND RRSIG RRsets DoS

Adobe Shockwave Player Memory Corruption (Jun 23, 2011)

Adobe Shockwave is a multimedia platform used to add animation and interactivity to web pages. Shockwave movies are authored in the Adobe Director environment. Any computer which has Shockwave plug-in installed can view Shockwave movies. Adobe Director files have the extension .dir which can be published into the Shockwave file format with extension .dcr.

A memory corruption vulnerability exists in Adobe Shockwave player. Specifically, the vulnerability occurs while processing specially crafted tSAC chunks in Director files. An attacker can exploit this vulnerability by enticing a user to open a crafted Director (.dir or .dcr) file. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the currently logged in user. Code injection that does not result in execution would terminate the application due to memory corruption.

The vulnerability has been assigned as CVE-2011-2118.

SonicWALL has released an IPS signature to detect and block known exploits targeting this vulnerability. The following signature was released to address this issue:

  • 6756 – Adobe Shockwave Director tSAC Chunk Memory Corruption PoC

McDonald's Free Dinner e-mail Leads to FakeAV (June 22, 2011)

SonicWALL UTM Research team received reports of a new spam campaign pretending to be arriving from McDonalds Restaurants being spammed in the wild. This campaign includes subject about “McDonalds Free Dinner”.

The sample e-mail format of the spam campaign includes the following:

Subject:

  • Come to us at our holiday of healthy and free food
  • Dont miss The Free Five-Course Dinner Day
  • Find the invitation to Free Day in the letter
  • Get a ticket for free helpings
  • Large free dish of five courses
  • Tasty and free food for each visitor
  • The Free Day holiday is here
  • The Free Dinner Day
  • The letter contains the ticket for free helpings
  • We are having the holiday of free food
  • We gift you a ticket to the day of free dishes

Attachment: Invitation_Card{Random Numbers}.zip (22.9KB)

screenshot

The executable file masquerades as a Microsoft Word document by using an icon seen below:

screenshot

If the user downloads and executes the malicious executable inside the zip attachment, it performs the following activity:

  • Creates the process SVCHOST.EXE and injects its code.
  • Copies itself as %Startup%/dxdiag.exe [ detected as GAV: Obfuscator.PO_2 (Virus) ] Sets the time stamp as the same with ntdll.dll to hide itself from malware tools that checks for newly created files.
  • Deletes the original executable file

Downloads other malware:

  • Application Datagog.exe – [ detected as GAV: FakeAV.LSX (Trojan) ]

Dropped files:

  • Application Datacompletescan
  • Application Datact_start
  • Application Data1.gif
  • Application Datainstall
  • Application Datastart

Added Registry:

  • Key: HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon
    Value: Shell
    Data:”Application Datagog.exe”

Network Activity:

This malware steals system information and sends them to remote server every 96 seconds.

    User-Agent: Our_Agent

  • http://diamond{REMOVED}e2011.ru//forum/task.php?bid={VolumeInfo}&os={OS Version}&uptime=0&rnd={random number}

Once the remote server receives the system information, it will acknowledge it and reply with commands as follows:

  • download – download other malware
  • update – update itself

FakeAV

    This malware also downloads and installs FakeAV application. Once installed it will show a Fake Microsoft Security Essentials Alert as seen below:

    screenshot

    After Clicking the “Scan Online” Button, it will show this message and prompts for rebooting the system:

    screenshot

    After rebooting the system, the following FakeAV screens will appear. It will then ask the user to pay for the software to completely clean the system.

    screenshot

    screenshot

    screenshot

    screenshot

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: Obfuscator.PO_2
  • GAV: FakeAV.LSX (Trojan)
  • GAV: Zurgop.Z#email (Trojan)

screenshot

Fake MS Removal Tool forces user to buy Fake AV software (Jun 17, 2011)

The SonicWALL UTM research team has received reports of a new FakeAV that is more intrusive than usual. Most FakeAV’s are simply annoying and cause pop-up windows to appear that encourage its victims to buy the software. Fakesysdef.BDF is a FakeAV that actually forces the user to buy the software. The system is rendered unusable until the software is paid for or removed.

The Trojan creates the following file on the filesystem:

  • C:Documents and SettingsAll UsersApplication DatajB04208NpCpC04208jB04208NpCpC04208.exe [Detected as GAV: Fakesysdef.BDF (Trojan)]
  • The file “jB04208NpCpC04208.exe” is a copy of the original Trojan file. The filename is randomly generated but always ends with “04208”. From further analysis it is suspected that “04208” is an affiliate ID. Once copied, the file is then run from its new location.

The Trojan creates the following registry keys to ensure startup:

  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce {random} “C:Documents and SettingsAll UsersApplication DatajB04208NpCpC04208jB04208NpCpC04208.exe” [Detected as GAV: Fakesysdef.BDF (Trojan)]

The Trojan will run silently in the background for a period of approximately 10 minutes. After this time the Trojan will remove the desktop background and pop up a fake system scan window named “MS Removal Tool”:

The Trojan will show a fake summary of results of the scan and prompt the user to remove the threats:

When trying to run most software on the system the Trojan will give a fake warning that the program is infected:

When clicking on “Remove all threads now” the user is taken to a payment page:

The Trojan was spotted communicating with 46.161.{removed}.{removed} for payment form information using the affiliate ID “04208”:

The Trojan was also spotted enumerating directories under C:Program Files and reading the contents of C:documents and settings{user}start menudesktop.ini.

The SonicWALL UTM research team have discovered various license keys posted on the internet that claim to disable this FakeAV software. However, the software is not removed from the system using these keys and still runs in the background.

After registering the software we observed continued suspicious behavior. The Trojan attempts to steal information from popular game titles that may be installed on the system:

SonicWALL Gateway AntiVirus provides protection against this threat with the following signature:

  • GAV: Fakesysdef.BDF (Trojan)

Microsoft Security Bulletins Coverage (Jun 15, 2011)

SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of June, 2011. A list of issues reported, along with SonicWALL coverage information follows:

MS11-037 Vulnerability in MHTML Could Allow Information Disclosure (2544893)

  • MHTML Mime-Formatted Request Vulnerability – CVE-2011-1894
    IPS 6154 MHTML Protocol Handler XSS Attack 1
    IPS 6155 MHTML Protocol Handler XSS Attack 2
    IPS 6201 MHTML Protocol Handler XSS Attack 3

MS11-038 Vulnerability in OLE Automation Could Allow Remote Code Execution (2476490)

  • OLE Automation Underflow Vulnerability – CVE-2011-0658
    IPS 4297 Generic Client Application Shellcode Exploit 1

MS11-039 Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2514842)

  • .NET Framework Array Offset Vulnerability – CVE-2011-0664
    This is a local vulnerability.

MS11-040 Vulnerability in Threat Management Gateway Firewall Client Could Allow Remote Code Execution (2520426)

  • TMG Firewall Client Memory Corruption Vulnerability – CVE-2011-1889
    There is no feasible method of detection.

MS11-041 Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2525694)

  • Win32k OTF Validation Vulnerability – CVE-2011-1873
    There is no feasible method of detection.

MS11-042 Vulnerabilities in Distributed File System Could Allow Remote Code Execution (2535512)

  • DFS Memory Corruption Vulnerability – CVE-2011-1868
    IPS 6714 Suspicious CIFS Traffic 7
  • DFS Referral Response Vulnerability – CVE-2011-1869
    There is no feasible method of detection.

MS11-043 Vulnerability in SMB Client Could Allow Remote Code Execution (2536276)

  • SMB Response Parsing Vulnerability – CVE-2011-1268
    IPS 6713 Suspicious CIFS Traffic 6

MS11-044 Vulnerability in .NET Framework Could Allow Remote Code Execution (2538814)

  • .NET Framework JIT Optimization Vulnerability – CVE-2011-1271
    There is no feasible method of detection.

MS11-045 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2537146)

  • Excel Insufficient Record Validation Vulnerability – CVE-2011-1272
    IPS 6707 Malicious Excel Document 11b
  • Excel Improper Record Parsing Vulnerability – CVE-2011-1273
    IPS 6708 Malicious Excel Document 12b
  • Excel Out of Bounds Array Access Vulnerability – CVE-2011-1274
    IPS 6709 Malicious Excel Document 13b
  • Excel Memory Heap Overwrite Vulnerability – CVE-2011-1275
    IPS 6710 Malicious Excel Document 14b
  • Excel Buffer Overrun Vulnerability – CVE-2011-1276
    IPS 6718 Malicious Excel Document 16b
  • Excel Memory Corruption Vulnerability – CVE-2011-1277
    IPS 6719 Malicious Excel Document 17b
  • Excel WriteAV Vulnerability – CVE-2011-1278
    IPS 6721 Malicious Excel Document 18b
  • Excel Out of Bounds WriteAV Vulnerability – CVE-2011-1279
    IPS 6715 Malicious Excel Document 15b

MS11-046 Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege (2503665)

  • Ancillary Function Driver Elevation of Privilege Vulnerability – CVE-2011-1249
    This is a local vulnerability.

MS11-047 Vulnerability in Hyper-V Could Allow Denial of Service (2525835)

  • VMBus Persistent DoS Vulnerability – CVE-2011-1872
    This is a local vulnerability.

MS11-048 Vulnerability in SMB Server Could Allow Denial of Service (2536275)

  • SMB Request Parsing Vulnerability – CVE-2011-1267
    IPS 6712 Suspicious CIFS Traffic 5

MS11-049 Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893)

  • XML External Entities Resolution Vulnerability – CVE-2011-1280
    There is no feasible method of detection.

MS11-050 Cumulative Security Update for Internet Explorer (2530548)

  • MIME Sniffing Information Disclosure Vulnerability – CVE-2011-1246
    There is no feasible method of detection.
  • Link Properties Handling Memory Corruption Vulnerability – CVE-2011-1250
    There is no feasible method of detect
    ion.
  • DOM Manipulation Memory Corruption Vulnerability – CVE-2011-1251
    IPS 6723 MS IE DOM Manipulation Memory Corruption Attack
  • toStaticHTML Information Disclosure Vulnerability – CVE-2011-1252
    There is no feasible method of detection.
  • Drag and Drop Memory Corruption Vulnerability – CVE-2011-1254
    IPS 6722 MS IE Drag and Drop Memory Corruption Attack
  • Time Element Memory Corruption Vulnerability – CVE-2011-1255
    There is no feasible method of detection.
  • DOM Modification Memory Corruption Vulnerability – CVE-2011-1256
    There is no feasible method of detection.
  • Drag and Drop Information Disclosure Vulnerability – CVE-2011-1258
    There is no feasible method of detection.
  • Layout Memory Corruption Vulnerability – CVE-2011-1260
    IPS 6148 Suspicious HTML BDO Tag
  • Selection Object Memory Corruption Vulnerability – CVE-2011-1261
    IPS 6717 MS IE Selection Object Memory Corruption Attack
  • HTTP Redirect Memory Corruption Vulnerability – CVE-2011-1262
    IPS 6716 MS IE HTTP Redirect Memory Corruption Attack

MS11-051 Vulnerability in Active Directory Certificate Services Web Enrollment Could Allow Elevation of Privilege (2518295)

  • Active Directory Certificate Services Vulnerability – CVE-2011-1264
    IPS 1369 Generic Cross-Site Scripting (XSS) Attempt 1
    IPS 3700 Generic Cross-Site Scripting (XSS) Attempt 3
    IPS 4948 Generic Cross-Site Scripting (XSS) Attempt 4
    IPS 1380 Generic Cross-Site Scripting (XSS) Attempt 5
    IPS 1381 Generic Cross-Site Scripting (XSS) Attempt 6

MS11-052 Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2544521)

  • VML Memory Corruption Vulnerability – CVE-2011-1266
    IPS 6711 MS VML Memory Corruption PoC

MS Host Integration Server Memory Corruption (June 10, 2011)

Microsoft Host Integration Server (a.k.a. HIS) is a gateway application providing connectivity between Microsoft Windows networks and IBM mainframe and AS/400 systems. Support is provided for SNA, 3270 (standard and Telnet 3270 TN3270E), 5250 (standard and Telnet 5250), CICS, APPC, and other IBM protocols. Support is also provided for advanced integration with Windows networks and software, such as linking Microsoft Message Queuing applications to IBM WebSphere MQ, binding Microsoft DTC transactions with CICS, and cross-protocol access to DB2 databases on IBM platforms. HIS is the successor to Microsoft SNA Server.

The Systems Network Architecture (SNA) communication protocol is a proprietary undocumented protocol, although it is still in wide use in the banking industry and various government agencies. Microsoft HIS deploys a number of services to handle the SNA protocol. By observing the traffic data, the following information can be deduced for the UDP traffic of snalink.exe, snaservr.exe and mngagent.exe services.

Offset Size (bytes) Description
0x00 2 payload size (starting at offset 0x39)
0x02 1 opcode
0x03 16 Unknown hostname (possibly source)
0x13 1 0x2a
0x14 15 Unknown
0x23 16 Unknown hostname (possibly destination)
0x33 6 Unknown
0x39 payload size payload

A denial of service vulnerability exists in Microsoft Host Integration Server. The vulnerability is due to an input validation error while parsing messages with a special opcode. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to any of the vulnerable services. This can lead to a denial of service condition.

SonicWALL UTM has researched and analyzed the vulnerability. The following IPS signatures has been created to detect/prevent the malicious traffic.

  • 6703 MS Host Integration Server Memory Corruption

Fake Desktop Utilities on the rise (June 8, 2011)

SonicWALL UTM Research team has observed a rise in fake desktop utility malware in the wild. A new fake windows recovery malware is making the rounds through drive-by downloads. We have observed other variants before but this variant employs some new tactics such as disabling the task manager, hiding user programs and files by modifying file attributes, hiding start menu items and disabling multiple operating system features.

As seen in the past with other fake utilities, it attempts to scare the user with fake errors and tries to convince the user to buy the product in order to fix those errors. It uses a fake icon and file name to masquerade as a legitimate file as seen below:

screenshot

It performs the following activities:

  • It creates a copy of itself in the following location
    • AppData%uaaiHfWFhq.exe
  • It reports new infection to a remote server
    • GET /404.php?type=stats&affid=508&subid=new02&awok HTTP/1.1
  • It creates the following registry entry to ensure infection on reboot
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunuaaiHfWFhq:”%AppData%uaaiHfWFhq.exe”
  • It executes the following commands in the background to modify the file attributes to be hidden
    • attrib +h “C:DocumentsandSettingsAllUsersStartMenu*.*”
    • attrib +h “C:DocumentsandSettingsAdministrator*.*”
    • attrib +h “C:*.*”
  • It moves contents of start menu from “All UsersStart MenuPrograms” to “%Temp%smtmp1”
  • It modifies the following registry values to disable various features
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystemDisableTaskMgr
      – Disables the task manager
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedHidden
      – Disables viewing of protected operating system files
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedShowSuperHidden
      – Disables viewing of hidden files
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerNoDesktop
      – Hides desktop icons
    • HKEY_CURRENT_USERSoftwareMicrosoftInternetExplorerDownloadCheckExeSignatures
      – Disables warning for downloaded software from untrusted publishers
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachmentsSaveZoneInformation
      – Disables preservation of zone information in downloaded and attached files

Here are some screenshots of the fake utility in action:

It generates fake warnings:
screenshot

screenshot

It simulates a scan and displays fake error messages:
screenshot

screenshot

screenshot

If the user proceeds to buy the advanced module it displays the following screen asking for credit card and personal information:

screenshot

SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:

  • GAV: FakeSysdef (Trojan)
  • GAV: FakeSysdef.A (Trojan)
  • GAV: Fakesysdef.BDA (Trojan)
  • GAV: Fakesysdef.BDB (Trojan)
  • GAV: Fakesysdef.BDC (Trojan)
  • GAV: Fakesysdef.BDD_2 (Trojan)
  • GAV: Fakesysdef.BDE (Trojan)
  • GAV: Dapato.AR (Trojan)
  • GAV: Dapato.D (Trojan)

HP Data Protector Client Command Execution Vulnerability (June 2, 2011)

HP OpenView Storage Data Protector is a backup solution that provides reliable data protection and high accessibility for fast growing business data. Data Protector offers comprehensive backup and restore functionality specifically tailored for enterprise-wide and distributed environments. The Data Protector has the folloiwng major features:

  • Scalable and Highly Flexible Architecture
  • Supporting Mixed Environments
  • Easy Installation for Mixed Environments
  • Easy Central Administration
  • Easy Restore
  • High Availability Support

HP Data Protector Architecture is based on the concept of a cell: a network environment that contains a Cell Manager, clients, and backup agents. The backup agents provide the Data Protector Backup Client Service which is implemented by the OmniInet process. The OmniInet process (omniinet.exe) is responsible for communication between systems in the cell as well as for starting other processes that are used for backup and restore operations. The service is started when the Data Protector is installed on a system.

The backup agent supports various message types in its communication with clients. The message is made up of multiple variable length strings. Each string is terminated with a NULL character. The strings may be ASCII or Unicode encoded. The encoding is determined by an optional two byte field at offset 4 in the message. The possible values are shown below:

Value Represents
0xFFFE Unicode (UTF-16) Little Endian byte order
0xFEFF Unicode (UTF-16) Big Endian byte order
none ASCII

A command execution vulnerability exists while HP Data Protector Client handles the above described message. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted message to the HP DataProtector Client. Successful exploitation will result in command execution with SYSTEM privileges.

SonicWALL UTM team has researched this vulnerability and created the following IPS signatures for them:

  • 6612 Generic Server Application Directory Traversal 5
  • 6613 Generic Server Application Directory Traversal 6

This vulnerability is referred by CVE as CVE-2011-0923.

Facebook worm targets Mac and Windows users (June 1, 2011)

SonicWALL UTM found reports of a new Facebook malware targeting Mac OS X and Windows users. The malware is actively spreading via a fake viral video utilizing through Facebook at the time of writing this alert.

A few weeks back we saw the first Rogue AV malware targeting Mac & Windows users via poisoned Google search results. This is the first instance of Facebook clickjacking worm targeting Mac and Windows users alike via a fake controversial video claiming to be of IMF boss Dominique Strauss-Kahn. The video is in reference to the news story that made headlines a few weeks back. This is a classic example of malware authors utilizing social engineering techniques to target large number of users via social media.

screenshot

If a Mac user clicks on the video, it will redirect the user to a Fake AV landing page that will run an animation showing Apple security center malware scanning and eventually fake infections. It then prompts the user to download and install Rogue AV in order to clean up the infections as seen below:

screenshot

screenshot

screenshot

Besides displaying Fake infection alerts, it also randomly opens pornographic websites in the browser from a predetermined list. This Rogue AV is similar in functionality to MACDefender except that it does not prompt the user for an administrator password in order to install. We were also able to confirm that this new Rogue AV variant evades the latest Apple security update .

If a Windows user clicks on the video, it will redirect the user to a fake YouTube look-alike site and prompts the user with a fake message to update Adobe Flash player in order to view the video. The user will download and install a Trojan executable if he runs the Flash update from that site as seen below:

screenshot

The dropped malware files for both Windows and Mac have a very low AV detection at the time of writing this alert.

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: MacDefender.A (Trojan)
  • GAV: MacDefender.FB (Trojan)
  • GAV: MalAgent.E_8 (Trojan)

RealNetworks RealGames ActiveX Command Execution (May 27, 2011)

RealNetworks operates a digital games service that includes downloadable and online games and subscription services. RealNetworks RealGames provides games for PC, mobile and social networks. RealGames owns multiple gaming brands such as RealArcade, Zylom, Gamehouse, among others. My Farm Life is one of the games that RealGames Gamehouse provides. During installation or My Farm Life, an ActiveX control, StubbyUtil, is installed and registered safe for scripting. The associated ClassID for this control is “5818813ed53d-47a5-abbb-37e2a07056b5”.
The control can be instantiated via a web page as in the following example:

  

The object exposes several methods such as CreateVistaTaskLow, Exec, ExecLow and ShellExec. The methods’ prototypes are shown:

 void CreateVistaTaskLow(BSTR ExecutablePath, BSTR Arguments, SystemString workDir) Boolean Exec(SystemString mod, SystemString cmdline, System boolan _MID_0098,System boolan _MID_0099 ) Boolean ExecLow(SystemString _MIDL_0117, SystemString cmdline, SystemString workDir) void ShellExec(SystemString _MIDL_0118) 

A command injection vulnerability exists in the StubbyUtil ActiveX control included within the My Farm Life application. The vulnerability is due to a design flaw in this control which allows scripting of several privileged methods. These methods are intended to be accessible only to authenticated users with sufficient privileges, but no access controls or restrictions are implemented in the ActiveX control. A remote attacker can inject and execute arbitrary Windows shell commands and binary executables on the client machine by passing the executable commands as arguments to the affected methods.
Remote unauthenticated attackers can exploit this vulnerability by enticing target users to open a specially crafted web page.
Successful exploitation of this flaw allows arbitrary command injection and execution with the privileges of the currently logged in user.

SonicWall has released several IPS signatures to address this threat. The following signatures have been released:

  • 6640 – RealNetworks RealGames ActiveX ShellExec Method Invocation
  • 6641 – Suspicious JavaScript Code 1
  • 6642 – Suspicious JavaScript Code 2

In addition to the signatures released to specifically address this vulnerability, SonicWall has existing generic IPS signatures that detect and block suspicious shellcode that is often used to exploit flaws such as this one.

Pin It on Pinterest