Training
Module
Protect against malicious attacks and unauthorized access with Microsoft Edge - Training
Protect against malicious attacks and unauthorized access with Microsoft Edge
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security Bulletin
Published: March 28, 2002 | Updated: May 09, 2003
Version: 1.3
Originally posted: March 28, 2002
Updated: May 09, 2003
Who should read this bulletin: Customers using Microsoft® Internet Explorer
Impact of vulnerability: Two vulnerabilities, the most serious of which would allow script to run in the Local Computer Zone.
Maximum Severity Rating: Critical
Recommendation: Consumers using the affected version of IE should install the patch immediately.
Affected Software:
Technical description:
This is a cumulative patch that includes the functionality of all previously released patches for IE 5.01, 5.5 and IE 6. In addition, it eliminates the following two newly discovered vulnerabilities:
Mitigating factors:
Cookie-based Script Execution:
Local Executable Invocation via Object tag:
Severity Rating:
Cookie-based Script Execution:
Internet Servers | Intranet Servers | Client Systems | |
---|---|---|---|
Internet Explorer 5.01 | None | None | None |
Internet Explorer 5.5 | Moderate | Moderate | Critical |
Internet Explorer 6.0 | Moderate | Moderate | Critical |
Local Executable Invocation via Object tag:
Internet Servers | Intranet Servers | Client Systems | |
---|---|---|---|
Internet Explorer 5.01 | None | None | None |
Internet Explorer 5.5 | Moderate | Moderate | Moderate |
Internet Explorer 6.0 | Moderate | Moderate | Moderate |
Aggregate severity of all vulnerabilities eliminated by patch:
Internet Servers | Intranet Servers | Client Systems | |
---|---|---|---|
Internet Explorer 5.01 | Critical | Critical | Critical |
Internet Explorer 5.5 | Critical | Critical | Critical |
Internet Explorer 6.0 | Critical | Critical | Critical |
The above assessment is based on the types of systems affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them. The Cookie-based script execution vulnerability cannot be exploited by email. The Local Executable Invocation vulnerability cannot pass parameters to the invoked executable. The aggregate severity includes the severity of vulnerabilities announced in previously released security bulletins.
Vulnerability identifier:
Tested Versions:
The following table indicates which of the currently supported versions of Internet Explorer are affected by the vulnerabilities. Versions of IE prior to 5.01 Service Pack 2 are no longer eligible for hotfix support. IE 5.01 SP2 is supported only via Windows® 2000 Service Packs and Security Roll-up Packages and on Windows NT® 4.0.
IE 5.01 SP2 | IE 5.5 SP1 | IE 5.5 SP2 | IE 6.0 | |
---|---|---|---|---|
Cookie-based Script Execution | No | Yes | Yes | Yes |
Local Executable Invocation via Object tag | No | Yes | Yes | Yes |
What vulnerabilities are eliminated by this patch?
This is a cumulative patch that, when applied, eliminates all previously addressed security vulnerabilities affecting Internet Explorer 5.01, 5.5 and 6.0. In addition to eliminating all previously discussed vulnerabilities versions, it also eliminates two new ones:
I notice that this particular IE cumulative patch supports IE 5.01 SP2 on Windows NT 4.0 SP6a. The other cumulative patch didn't support this version of IE, why is Microsoft supporting it now?
Based on feedback from customers and their needs, Microsoft will provide support for IE 5.01 on Windows NT 4.0 for this release of the IE cumulative patch. This support is slated to be discontinued in June 2002.
Cookie-based Script Execution (CVE-CAN-2002-0078)
What's the scope of first vulnerability?
This is an elevation of privilege vulnerability. An attacker who was able to successfully exploit this vulnerability would be able to cause HTML scripts on a web site to execute as if they were run locally on the user's system. This could allow the scripts to run outside of the constraints usually imposed on web site scripts. The scripts could then take any action on the system as if they were the user.
The attacker's actions would be limited by any restrictions which govern the user's actions. Thus, in an environment where accounts adhere to the rule of least privilege, the attacker might be significantly limited in the actions his program could take.
What causes the vulnerability?
The vulnerability results because of a flaw in how IE determines the correct security zone handling for scripts embedded in cookies. Specifically, it incorrectly treats scripts embedded in cookies as if they should be run in the Local Computer zone, rather than the same zone as the web site with which the cookie is associated.
What is a cookie?
Cookies are small data files that web servers use to store and retrieve information that is useful throughout a session. For example, suppose a web site provided a way for visitors to obtain weather reports for different parts of the country. The site might allow visitors to customize the site so that the weather report for their preferred city would be presented every time they visited the site. This customization would be accomplished by storing the users' preferences in a cookie that would be read by the site each time the user visited and be used to determine and present the right customized information.
Because each site's customization needs are different, cookies are designed to be flexible and let the site decide what kind of information is stored and the way that data is stored. For security of data each site can only access information in it's own cookie.
Why can script be embedded in a cookie?
As noted, cookies are a free-form means of data storage. By design, it is left to the web site to determine what information to store in a cookie and how to store it. Because of this, a site can choose to store any information in any way in a cookie, including HTML scripting information.
Because scripts contained in cookies are in essence an extension of the web site itself, the same security zone that applies to a web site, should also apply to its cookie.
What are security zones?
IE Security Zones are a system that divides online content into categories, or zones based on its trustworthiness. Specific web sites can be assigned to a zone, depending on how much you trust the content of each site. The zone then restricts the capabilities of the web content, based on the zone's settings.
By default, most Internet sites are reckoned as part of the Internet zone, which has settings that prevent scripts and other active code from accessing resources on the local machine. Conversely, the Local Computer zone is a much less restricted zone which allows content to access and manipulate content on the local system. By default, files stored on the local computer are run in the Local Computer zone.
What's wrong with how IE handles script embedded in a cookie?
As we noted above, script in a cookie should be handled within the Security Zone associated with the web site that owns the cookie. However, because cookies are stored locally, IE incorrectly reckons that script within cookies should be governed by the Local Computer Zone, rather than the Internet Zone.
What would this enable an attacker to do?
An attacker could attempt to exploit this vulnerability and cause script to execute as if it were run on the local system rather than from a remote web site. Because the script would be run in the Local Computer zone, which is less restrictive than the zones that govern remote sites, the script would run with few limitations. The script would run as if it were run by the user. This could allow the script to access local resources on the user's computer. The script would then be able to take actions on the local system as if it were the user herself, including adding, changing, or deleting data or configuration information.
How might an attacker exploit this vulnerability?
An attacker seeking to exploit this vulnerability would have to build a specially formed cookie with scripting embedded within it. He would then either post it on a web site under his control and attempt to entice a user to visit his site, or send the web page as an HTML email message to the user. In both cases, once the page was loaded and read the cookie, the script would execute.
Would disabling cookies stop an attacker?
Yes, disabling cookies would stop an attempt to exploit this vulnerability by preventing the loading of cookies. Since the vulnerability requires the cookie to be loaded on the local system, this setting blocks this attack vector.
How does the patch eliminate this vulnerability?
The patch eliminates the vulnerability by having the zone determination correctly assign cookies to the same zone as the originating page. Thus, if a page is in the Internet zone, any script in a cookie offered by the site will be handled in the Internet zone.
Local Executable Invocation via Object tag (CVE-CAN-2002-007)
What's the scope of the second vulnerability?
This vulnerability could allow an attacker to invoke an executable already present on the user's machine. The attacker could create a specially formatted web page that exploits this vulnerability and either post it on a site under his control, or send it by email to the user.
The vulnerability does not provide a way for an attacker to deliver a program of his choice to the system; the program invoked must exist on the system for the attacker to invoke it. In addition, no parameters can be sent to the invoked application. Thus, the extent to which an attacker could exploit this is limited to simply invoking program already present on the system.
What causes the vulnerability?
The vulnerability results from a flaw in how IE applies security zones to objects invoked on an HTML page with the codebase property. In certain instances, IE incorrectly reckons these objects as being part of the Local Computer zone, even though the page itself is in a different zone, such as the Internet zone. Because the Local Computer zone is less restrictive than other zones, this can allow the web page to run executables on the local system without prompting.
What is the Codebase property?
The CODEBASE propertyis an HTML standard that allows a web page to specify a location for downloading of helper applications that may not be present on the local system. For example, if a web page designer wanted to be able to invoke the Common Control dialog in his web page, to give the page the same "look and feel" of the Windows explorer, he can specify a download location for that object in case it's not present on the local system already.
What's wrong with how the Codebase property is handled by IE Zones?
When the codebase property is used in conjunction with a resource on the local computer, it's incorrectly reckoned as part of the Local Computer zone, rather than the zone of the web page. If you set the CODEBASE property to the file path of a local executable, that executable would be run in the Local Computer zone, even though the page invoking it is in the Internet zone. This means that the executable would be run without any prompting to the user. It also means that the executable could be run with the same privileges as the user.
What would this enable an attacker to do?
An attacker could use this vulnerability to invoke an executable that is already present on the local system. For example, an attacker could call cmd.exe, the command shell, and make a command window appear. However, the vulnerability would not enable the attacker to pass any parameters to the program. This turns out to be a significant mitigator
You said the inability to pass parameters was a signficant mitigator. Why?
Parameters are pieces of information that are provided to a program when it's executed, and tell the program what action to perform, or where and how to perform it. For example, consider the program that opens a command prompt, cmd.exe. If it's called with no parameters (e.g., "cmd.exe"), it simply opens a command prompt. However, if it's called with another program's name as a parameter (e.g., "cmd.exe ver.exe"), it will run the second program at the command prompt. In the case of our example, it would run the Ver.exe program, which shows what version of Windows you're running.
The vulnerability does let an attacker run a program, but it does not provide a way for the attacker to pass parameters to it. Thus, the attacker could run cmd.exe and open a command prompt, but couldn't make anything happen at the prompt. The vulnerability could only be used for destructive purposes if there was a program on the user's system that was dangerous when called without parameters, However, Microsoft has checked the list of programs that ship by default with Windows but found none that are dangerous when called without parameters.
How might an attacker exploit this vulnerability?
An attacker could create a web page that exploits the vulnerability and host it on a malicious web site. If a user visited the site and opened the web page, the page could use the vulnerability to run a program on the user's local machine. An attacker could also send the malicious web page to a user as an HTML mail. If the recipient opened the mail, it would likewise attempt to exploit the vulnerability and run a program.
Can an attacker run any program on my computer?
An attacker could run any program already present on the other user's local computer; however, he or she would need to know its name and location on the computer. Some programs have well-known and predictable names and locations, but others do not.
Could an attacker use this vulnerability to load a program on my machine from their web site or server?
No. An attacker could only use this vulnerability to invoke an executable that's already present on the user's system. It provides no way for an attacker to transfer a program of his choice to the user's system.
I heard that an attacker could forcibly log me off my computer using this vulnerability. Is this true?
Among the programs that ships with Windows is logoff.exe, which is designed to shut down the system and doesn't require any parameters. If an attacker exploited this vulnerability and chose to run logoff.exe, it would have the effect of shutting down the user's system. However, the user could resume normal operation by just restarting the computer, and could avoid future attacks by not returning to the web site that mounted the attack.
Can an attacker read any files through the vulnerability or see any of my personal information?
Only if there were a program already present on the machine that would be able to do this - the vulnerability itself does not provide a any way to view data on the local system.
How does the patch eliminate this vulnerability?
The patch eliminates the vulnerability by handling assigning local objects invoked by the codebase property to run in the same zone as the originating page.
Does this patch include the fix for MS02-009?
No. The fix for MS02-009 is a VBScript fix that is available pending a broader fix in IE in an upcoming service pack.
Download locations for this patch
Installation platforms:
Inclusion in future service packs:
Reboot needed:
Yes
Superseded patches:
Verifying patch installation:
Caveats:
None
Localization:
Localized versions of this patch are available at the locations discussed in "Patch Availability"
Obtaining other security patches:
Patches for other security issues are available from the following locations:
Acknowledgments
Microsoft thanks Andreas Sandblad, Sweden for reporting the Cookie-based Script Execution issue to us and working with us to protect customers.
Support:
Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.
Disclaimer:
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions:
Built at 2014-04-18T13:49:36Z-07:00
Training
Module
Protect against malicious attacks and unauthorized access with Microsoft Edge - Training
Protect against malicious attacks and unauthorized access with Microsoft Edge