Tuesday, April 3, 2007

Microsoft ANI Vulnerability Update

Via ComputerWorld -

April 03, 2007 (Computerworld) -- Contrary to other reports, Mozilla Corp.'s Firefox 2.0 is vulnerable to attackers armed with the Windows animated (ANI) cursor exploit, a researcher said today.

Alexander Sotirov, the vulnerability researcher at Determina Inc. who discovered the ANI flaw last December and notified Microsoft Corp. of it later that month, yesterday posted a demonstration of an ANI exploit that hijacks a PC when Firefox users are conned into visiting a malicious site (see video).

"It turns out that Firefox uses the same vulnerable Windows component to process .ani files, which can be exploited in a way similar to Internet Explorer," Sotirov said during the demo.

--------------------------------------

Check out this ANI exploit other video by Muts (from the BackTrack team). He demos using BackTrack w/ the MSF SMTP exploit against a user...very slick.

In exploit news, Yag Kohha released a universal ANI exploit generator tool.

Microsoft has taken the threat pretty serious and released MS07-017 out of band. It is important to note that MS07- 017 fixes seven issues and not just the ANI vulnerability. There are some reports of this patch causing issues, so make sure you test it before deploying it in the enterprise.

Those that know more about this than me, tell me that the MS patch should fix the vulnerability for Firefox as well, since they are both using the same code in a round around way.

HD Moore has released two ANI exploits for MSF3.

No comments:

Post a Comment