Feeds

MS Exchange-2K, Excel-XP security warnings

Malicious fun with SMTP and style-sheets

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

First up we have a potentially crippling exploit with Exchange 2000, in which a malformed mail attribute can spike the system CPU to 100% load while the malicious message is being processed. Re-starting the service or re-booting the Exchange server will not correct it; the process will resume automatically as soon as the service is re-started. Depending on the attacker's ingenuity, a server could be taken down for anywhere from a few seconds to several hours.

The problem lies in the Store function that processes messages, which takes precedence over other Store functions which might otherwise be invoked to clear the offending message, MS says. It was discovered by a team of researchers from Johannes Gutenberg University in Mainz, Germany.

This isn't quite k1dd13 stuff. An attacker would have to create a raw message and establish a direct connection to the target server. It's not something one can accomplish by playing around with an e-mail client; a successful attacker would have to be quite familiar with SMTP, which narrows the threat field.

That being said, the potential for a crippling DoS attack is sufficient for MS to brand this one 'critical', a denomination which it avoids like the plague. As usual the MS bulletin is unbearably vague about what's going on here, with frequent recourse to meaningless generalities like 'a specially malformed attribute'.

On the positive side there's no potential for a system compromise here, Exchange 5.5 is not affected, and there is a patch for 2K posted here. The patch, we're told, will reject messages possessed of those 'specially malformed attributes', whatever they happen to be.

Next up we have a glitch in Excel-XP style sheets, discovered by Georgi Guninski. This is k1dd13 material, so beware. If a user views an .xls file using the XML style sheet, it's quite easy for an attacker to run or call executable code. Guninski gives a harmless example in his advisory, which will simply call a shell and list your directories for you, thus:

xls_sux.xls
<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="#?m$ux" ?>
<xsl:stylesheet xmlns:xsl="http://www.w3.org/TR/WD-xsl">
<xsl:script>
<![CDATA[
x=new ActiveXObject("WScript.Shell");
x.Run("%systemroot%\\SYSTEM32\\CMD.EXE /C DIR C:\\ /a /p /s");
]]>
</xsl:script>
<msux>
msux
written by georgi guninski
</msux>
</xsl:stylesheet>

As for the malicious potential here, we'll just leave that to the admirably evil imaginations of our beloved readers.

On the plus side, style sheets are not selected by default, so when the exploit runs, users should be asked if they want to view the file with the style sheet. How many will think, 'yeah, that sounds like an improvement' as opposed to those who will think, 'stuff that Redmond gimmick' we can't guess.

For a workaround, Guninski offers this bit of wisdom: "Power-off the poor Windoze box if you see Excel mentioning style sheets."

We can offer no better advice. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Google opens Inbox – email for people too thick to handle email
Print this article out and give it to someone tech-y if you get stuck
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.