Scotsman Site Admin
Joined: 03 Aug 2004 Posts: 705 Location: MadWolf Software
|
Posted: Wed Sep 07, 2005 8:23 am Post subject: Security vulnerabilities explained |
|
|
Watching the Palace mail lists, some have been trying to explain what the previously posted security alert actually means. I'm going to make an attempt to explain what this type of exploit is and does in simple terms here, and why it is so dangerous.
Note: this type of thing can happen with any old unsupported software, not necessarily just Palace. Palace is just one that has been reported and is in the realm of my expertise so will stick to what I know.
What it really boils down to is a bug in the Palace client when it processes a Palace URL (i.e. palace://). What happens is the Palace doesn't check the length of the URL it is being given and places it into it's processing buffer. If the URL is malicous and coded to be longer than the processing buffer it can have binary code attached to the end that if formed correctly will execute, thus allowing the cracker to download anything they want, scrap a hard drive, or anything else.
What makes this even more dangerous is that you don't have to be in Palace for this exploit to be used. The malicous URL could be on a website (including forums like this one, blogs, email, anything that can pass a URL), when clicked it would cause Palace to launch and thus your machine would be hacked. Just having Palace installed thus opens your computer to this vulnerability. |
|
Rhonk
Joined: 03 Aug 2004 Posts: 36 Location: St. Peters, MO
|
Posted: Wed Sep 07, 2005 8:37 pm Post subject: Javascript |
|
|
Forgot to mention an automated Javascript link...
Throw some Javascript code to open the palace:// URL and poof.
Only thing is it takes a somewhat decent coder to figure out all the lovely ways to do things. Which, if this had been a Microsoft product, would be 3-6 hours after the patch arrives on Windows Update and would take about a month and a half for everyone to realize "I should've updated sooner!"
Words of wisdom? Update! Update! Update!
Windows may not be the most secure OS but what is these days? It's just a high priority target. One could write a Perl script for MacOS X, Linux, and UNIX which does 100% the same thing and have it run (with user interaction of course). But needless to say, when a security issue arises don't wait! Most OS patches are seemingly large but worth the wait if you have dial up. At least you don't need to download a patch cluster that ranges between 200MB and 400MB just for a single patch update...Pardon my reference to Sun's lack of security support without payment.
This has been a public service announcement by Ephemeris Second. _________________ -Erik "Rhonk" Arnson |
|