BugTraq
Advisory: Internet Explorer Drag and Drop Redeux [CVE-2005-3240] (fwd) Feb 14 2006 12:40AM
Matthew Murphy (mattmurphy kc rr com) (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

My apologies to those who are receiving this late or are otherwise
inconvenienced by the staggered release. I had unexpected, last-minute
travel issues that interfered somewhat with today's release.

Of note since the initial drafting of the advisory is that Microsoft has
released a blog post on the MSRC blog about the vulnerability report,
which can be read here:

http://blogs.technet.com/msrc/archive/2006/02/13/419439.aspx

The technical/strategic points about the exploit that are raised in the
post are indeed accurate (though it references MS05-014, when I believe
the correct reference is MS05-008/MS05-013). The exploit has a greater
dependence on timing than previous, related attacks. As such,
Microsoft's decision not to include this issue in a standalone patch is
seemingly justified at this point. However, the point of disagreement
with Microsoft remains the choice of release *timeline*.

I released the information about this issue to a trusted colleague (Gadi
Evron) for publication today, after what I felt was a reasonable time,
in light of my difficulties obtaining internet access.

Though there are disagreements between myself and Microsoft about the
nature of this vulnerability, I would like to thank Brian Schafer of the
MSRC for adhering to a high level of professionalism and technical
accuracy in that post and for continuing to work with me once it was
made clear that the issue would imminently become public.

Also of note is that there was a typo in the information I provided
originally to SecuriTeam. The proper candidate is CVE-2005-3240, not
*3840* as was originally reported by me. SecurityFocus has also
informed me that my original BID reservation was a casualty of a data
migration and that the proper BID associated with this vulnerability is
now BID 16352, which is public in full detail as of this writing.

There have also been some incorrect reports made to SecuriTeam that this
issue does not affect Windows XP Service Pack 2. These reports are not
correct -- my testing during this investigation was done exclusively on
current installations of Windows 2000 and Windows XP. These systems had
all service packs applied and all updates installed when tests were
performed.

Thanks to Gadi Evron for doing some of my bidding today and taking some
of the heat for my fat-fingers.

The final advisory, corrected with the now-accurate references is
attached with an armored-format PGP signature inline.

- --
"Social Darwinism: Try to make something idiot-proof,
nature will provide you with a better idiot."

-- Michael Holstein

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB5444D38

iD8DBQFD8Sb9fp4vUrVETTgRA6VJAKCL+fMJ8b+cIyOPE5Ld+3C2vgCIOgCffRW5
f1H8M88AzB9oMaE32XUUFbk=
=AVSg
-----END PGP SIGNATURE-----
0? *?H?÷
 ?0?1 0 +0? *?H?÷
 ? ó0??0?¨ 
0
 *?H?÷
0Ñ1 0 UZA10U Western Cape10U Cape Town10U
Thawte Consulting1(0&U Certification Services Division1$0"UThawte Personal Freemail CA1+0) *?H?÷
 personal-freemail (at) thawte (dot) com0 [email concealed]
030717000000Z
130716235959Z0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CA0?0
 *?H?÷
0?Ä¦<UsUûN¹Ê?ZhÀupßéÿ£ì½Íõ[òv½ :aò¿QÎÔåP
0×cZ,?p?ÝÉð+?Zª?qV˯< çñ?6$*Ï+Õó?w=¾+þ»>¿@?dק¦»?eÑÅ*T?H§¶Ñ<
a@dr`·û£?0?0Uÿ0ÿ0CU<0:08 6 4?2http://crl.tha
wte.com/ThawtePersonalFreemailCA.crl0 U0)U"0 ¤010UPrivateLabel2-1380
 *?H?÷
H?ÑP?ê .Ì
£f¬g¯¬¾Â¡C??L!¸ø6ª-?6/ÀôP ?p<ý­áabÃÙ:~?±?Å ?t?%P?bÇÛ'qW%Ý©?9?? Oe_?Ú÷÷?ÖÆN®öê4å[5MwãV!x?Ü!5Þ$±ÓFÿ]_eO0?T0?½ iÍ0
 *?H?÷
0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CA0
050902204005Z
060902204005Z0?10UThawte Freemail Member1#0! *?H?÷
 mattmurphy (at) kc.rr (dot) com1 [email concealed]0 *?H?÷
 mrm565s (at) smsu (dot) edu1 [email concealed]+0) *?H?÷
 Matthew007 (at) MissouriState (dot) edu0 [email concealed]?"0
 *?H?÷
?0?
?³Ò³aI4ÒNæߍT??BÔÂo<Hr¨HéüºJ¨ª(%
æ:?`ã¶Äh¿æÒÌa½WÍkþ
MÏH?U$1eÒ­×YÊüy-Gx®IÊ÷)?Ì?áÁd< ]çÐ ¶7Í?d¼?U³C½g??Ô§?´?ì#6?ªüç??õ³|?N2?X[?!+Öèá÷qRQ ú??¡ë"AÒ7?ä?
pÓ rg<Yúá?á<ÆóGI???ÅTå>?+^sZ?®,? ÄȪ\?Ó\ýb? N+Æ? 7ש´.D??rÞ³áÆî?
Q(¦Þ?Å?U£a0_0OUH0Fmattmurphy (at) kc.rr (dot) com [email concealed]mrm565s (at) smsu (dot) edu [email concealed]Ma
tthew007 (at) MissouriState (dot) edu0 [email concealed] Uÿ00
 *?H?÷
Y`?lX=ÍJ×7'%I6éBñʽ¬6Îe ¦àC?4??>?e¯ã{J ¾ª|÷°×õµ,¤ty¶UÀ9AÑMÔ?[ð I
zºðm?b3(bgá?ð?ëÞ |??i?h?;ß3ô&?ó­}Ïú?P¶ í3ìź=^ô"0?T0?½ iÍ0
 *?H?÷
0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CA0
050902204005Z
060902204005Z0?10UThawte Freemail Member1#0! *?H?÷
 mattmurphy (at) kc.rr (dot) com1 [email concealed]0 *?H?÷
 mrm565s (at) smsu (dot) edu1 [email concealed]+0) *?H?÷
 Matthew007 (at) MissouriState (dot) edu0 [email concealed]?"0
 *?H?÷
?0?
?³Ò³aI4ÒNæߍT??BÔÂo<Hr¨HéüºJ¨ª(%
æ:?`ã¶Äh¿æÒÌa½WÍkþ
MÏH?U$1eÒ­×YÊüy-Gx®IÊ÷)?Ì?áÁd< ]çÐ ¶7Í?d¼?U³C½g??Ô§?´?ì#6?ªüç??õ³|?N2?X[?!+Öèá÷qRQ ú??¡ë"AÒ7?ä?
pÓ rg<Yúá?á<ÆóGI???ÅTå>?+^sZ?®,? ÄȪ\?Ó\ýb? N+Æ? 7ש´.D??rÞ³áÆî?
Q(¦Þ?Å?U£a0_0OUH0Fmattmurphy (at) kc.rr (dot) com [email concealed]mrm565s (at) smsu (dot) edu [email concealed]Ma
tthew007 (at) MissouriState (dot) edu0 [email concealed] Uÿ00
 *?H?÷
Y`?lX=ÍJ×7'%I6éBñʽ¬6Îe ¦àC?4??>?e¯ã{J ¾ª|÷°×õµ,¤ty¶UÀ9AÑMÔ?[ð I
zºðm?b3(bgá?ð?ëÞ |??i?h?;ß3ô&?ó­}Ïú?P¶ í3ìź=^ô"1?;0?70i0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CAiÍ0 + ?§0 *?H?÷
 1  *?H?÷
0 *?H?÷
 1
060214004029Z0# *?H?÷
 1£4ýaægµ³?Z??ï68Õ?í0R *?H?÷
 1E0C0
*?H?÷
0*?H?÷
?0
*?H?÷
@0+0
*?H?÷
(0x +?71k0i0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CAiÍ0z *?H?÷
  1k i0b1 0 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CAiÍ0
 *?H?÷
?f8õrÇl?ÒõûÑO¦?KE
?û^¬?jéÛ{lФPS¯Ø&.¸zl?åƷ̪:÷óÏE?cDüÒ3´º>D£ªZa?°.¾o9¦??jT¥?¹ü
¹?UòX+¿?:`Ã"Ü?« ÿ,ýǺØ&ñYf???sv¦??FÙvÈ*0wbn8ÆU?ÑO¥?[]÷8 U2?rVË??ZH?2~6¼ê?¾#¬°
^µ?4?AüAPì(ä]GI֐üɤ{?7×ûr½da=?×äU?0G½`×­Eû³4ź-&?Ð\Ç?fLKMÊ?ÎL,
ª

[ reply ]
Advisory: Internet Explorer Drag and Drop Redeux [CVE-2005-3240] (fwd) Feb 14 2006 12:46AM
Matthew Murphy (mattmurphy kc rr com)


 

Privacy Statement
Copyright 2010, SecurityFocus