Safari "Carpet Bomb" Attack Code Released 118
snydeq writes "A hacker has posted attack code that exploits critical flaws in the Safari and Internet Explorer Web browsers. The source code can be used to run unauthorized software on a victim's machine, and could be used by criminals in Web-based computer attacks, security experts say. The public example of the attack code allows attackers to litter a victim's desktop with executable files, an attack known as 'carpet bombing.' In combination with bugs in Windows and Internet Explorer, attackers can run unauthorized software on a victim's computer."
Re:Secure from the ground up! (Score:5, Informative)
So the real issue is that Safari can be told to automatically download a file while internet explorer will automatically run a malicious dll from the desktop. actual post and proof-of-concept code here [fc2.com].
seems like a misleading summary to me.
Re:Secure from the ground up! (Score:4, Informative)
So the real issue is that Safari can be told to automatically download a file while internet explorer will automatically run a malicious dll from the desktop. actual post and proof-of-concept code here [fc2.com].
seems like a misleading summary to me.
Re: (Score:3, Informative)
Re:Secure from the ground up! (Score:5, Informative)
The 'workarounds' suggested by MS include "Change the download location of content in Safari to a newly created directory". I don't actually know what's going on with this, but it seems like it's IE opening an improperly-named (or maybe there's some bad meta-data that comes along with it?) file from the desktop, no matter how it got there.
Closest resources first (Score:2)
For example, if IE needs to use mm.dll it will first look in the working folder, if it doesn't find it there, if will check the system's path variable and see if it can find the library in any of those folders.
In this specific case, if you are running Safari, it can auto download a new file, say, 'mm.dll' to your desktop. Safari doesn't care about it, BUT, the next time you start IE f
Re: (Score:3, Informative)
And yet this is listed as a Safari flaw?
Come on, how insanely insecure is it to run executable code from the desktop! Hasn't windows had protection on the windows and system32 directories for about 6 billion years now for this very reason? And then they go and make it pull executable code from just about the least secure place on any PC.
From where I'm sitting this is a massively Microsoft problem, but their suggested "fix" is still the easiest solution by far. B
Re: (Score:3, Insightful)
It is a safari flaw (Score:1)
Re: (Score:2, Interesting)
This issue is about the execution of code WITHOUT user interaction.
You can have an argument about the pros and cons of the Safari Feature somewhere else. This is not the problem here.
Re: (Score:2)
Re:Secure from the ground up! (Score:4, Informative)
So yes, IE is in fact autoloading executables from the desktop. It's Safari's vulnerability to carpet bombing that sets the stage, but it's IE and Windows that cause the big boom.
Re: (Score:2)
Re: (Score:2)
Re:Secure from the ground up! (Score:5, Informative)
Basically, on Windows Safari automatically downloads files, in imitation of its behavior on OSX, but whereas on OSX it downloads them to a nice ~/Downloads directory on Windows it downloads them to the desktop. Also, on OSX Safari tags the downloaded file as 'unsafe', but it fails to use the Windows functionality to do the same on Windows. This leaves a whole load of files that you never asked for or wanted lying around on your computer in a state that is one step away from being executed.
This 'attack' allows a malicious person to force Safari to dump thousands of files on your desktop, which in and of itself is not a nice thing, but when coupled with other exploits it can lead to code execution of these files you never wanted in the first place - whether those exploits are patched by the vendor (Microsoft) or not, we both know that a significant portion of desktops are not kept fully up-to-date with security releases.
mod parent up (Score:5, Insightful)
If Windows has an "unsafe" flag for files, it should be used by Safari. Also, I find using desktop as default download space incredibly annoying (yes, i'm looking at you firefox).
That said, IE should also know better than to execute random files from the desktop, which seems like the nastier issue here.
There is one (Score:4, Informative)
Re: (Score:2)
location is fine, automatic download is the issue (Score:2)
In fact, I'm kindof surprised that the surlier parts of the web (warez sites and such) aren't already using this to dump porn ads on your desktop.
Re:location is fine, automatic download is the iss (Score:2)
We could also do our part, pushing an image that say something alone the lines of "Your Safari browser is not properly configured for download security, please change your default download directory to yadayda..."
Re: (Score:3, Informative)
These files are being loaded as trusted libraries of shared code that likely bypass anti-virus and other such protection apps.
Re: (Score:2)
It would be easy enough to test this out though. manually download this DLL using IE (which marks the file as unsafe), then fire up IE7.
Yup! (Score:5, Informative)
Carpet bombing is still an issue, if for no reason than it is an annoyance.
Re: (Score:2)
Re: (Score:2)
No it doesn't. It downloads to ~/Desktop by default. You have to change that yourself. (Unless 10.5 has a new folder that 10.4 doesn't)
Re: (Score:3, Informative)
Re: (Score:1)
You can read about this functionality here [apple.com].
It's been out since last year, which in Mac OS X release terms is quite a while (10.6 seeds are just being released). It would be wise to upgrade when updates for Mac OS X are available, there is a real point to upgrading, both for developers and end users, particularly because of the number of under the hod improvements each release has
Re: (Score:2)
Re: (Score:3, Insightful)
there are two problems (Score:1)
Application B is not setting its working directory correctly.
Re: (Score:1, Redundant)
Wrong section, eds! (Score:5, Informative)
Re:Wrong section, eds! (Score:4, Informative)
the "bug" is that Safari has the users desktop as the default download directory, and will automatically download files if you go to some websites. This is normal and fine behavior. The problem is that Internet Explorer loads files from the desktop on launch, which means if you craft a malicious library and put it on the desktop Internet Explorer will happily load it.
Microsoft should fix IE to avoid loading files from the Desktop.
Re:Wrong section, eds! (Score:4, Insightful)
No, it isn't.
Re: (Score:2)
It really is bad UI behavior (on both Mac and Windows).
Re: (Score:2)
Re: (Score:2)
And yes the "Open/Save Dance" is exactly what is supposed to happen before files are saved to the disk.
Re: (Score:1)
As for the Open/Save Dance somehow being the ultimate solution to this, what do you think the average user (read: almost all users) does when they see an Open/Save box? They jam that OK key until it goes away and stops asking them a hard question. This effectively nullifies the criticism of the feature. It is worth noting that Firefox by default downloads files t
Re: (Score:2)
Even aside from the security aspects, Safari's UI behavior is just stupid. Users can sit there pounding on a "Download" link with absolutely zero visual confirmation that something is actually happening. Love to see where that's spelled out in Apple's HIG.
(Also forgot that this is the default behavior of Firefox (it can be turned off), and yes the social-engineering aspect is equally a problem there too.)
Re: (Score:3, Insightful)
Safari isn't implementing the basic security that is implemented in Windows.
Re: (Score:3, Informative)
Then again, maybe I'm wrong. If you download and install a printer driver, are you warned the driver is unsafe the first time your try to print?
Re: (Score:2)
Also, IE's behavior for anything unsafe (Unless you SPECIFICALLY changed the setting in options) is to ask you or outright deny it, without regard to the parent process. Has been since IE5.5.
Re: (Score:2)
The process described is providing a raw DLL file that is being included from an insecure location without any verification, authorization or authentication.
This has been verified by another poster in another thread: download the file with IE and put it on the desktop and the next time you launch IE, the exploit it enabled.
Re: (Score:2)
I've known about this attack vector for years. Even FAT-based systems are vulnerable. It's actually one of the flaws responsible for WinME dying so much (there was a hidden DLL on the desktop that if corrupted would totally fry ME because of the default being to load active web conten
Re: (Score:2)
No, the problem is that Safari doesn't utilize the functionality Windows has for marking files as safe or unsafe when it downloads something, thus allowing IE to open said files. Safari isn't implementing the basic security that is implemented in Windows.
No, the problem is that you are confusing Safari with Firefox. Oh yeah, and that IE doesn't check the basic security that is implemented in Windows when it starts any old DLL on the Desktop.
Don't believe me? Download the DLL from the page to your Desktop and restart IE - presto.
Re:Wrong section, eds! (Score:5, Informative)
Safari should NOT be auto-dumping files onto the Windows desktop. PERIOD.
There's enough blame to go around everywhere.
Re:Wrong section, eds! (Score:4, Informative)
That said, IE is worse here - downloading files without my permission is bad form, but a pre-installed system app loading DLLs from any old place that it finds them, especially one of the most common places to dump downloaded files, is just idiotic.
Shame on all.
IE's behavior would be fine (Score:1)
Re: (Score:2)
Re: (Score:2)
Don't forget, Firefox/Gecko penetration is a lot lower on Windows than in Mac OS X. Windows users generally don't change their browsers from Internet Explorer.
Quick Workaround... (Score:5, Informative)
1) Launch IE from a location other than your desktop (e.g. Start Menu, Quick Launch Tray).
2) Go to Program Files\Internet Explorer, Create Shortcut, and then place that shortcut on your desktop. Make sure the "Start In" setting is set to any location other than your Desktop.
Better yet... (Score:3, Insightful)
Re: (Score:1)
There's no reason they can't start going after other applications, say Microsoft C runtime, or a host of other system dlls.
In that case it is likely that any application launched could have the problem.
You would deliver the binary attack this way:
1: Download evil comctl32.dll from malicious.nl to \downloads
2: Download Utility.exe from opensource.org to \downloads
3: Run Utility.exe from \downloads
4: Machine is infected
5: P.. nvm.
Solution is to educate users that dlls
Re: (Score:1)
Granted it gives you an Open/Save dialog first, but since when do people read let alone understand dialog boxes?
Re:Quick Workaround... (Score:5, Insightful)
C:\Program Files\Notepad++\notepad++.exe %1
This problem seems to be two fold. First, Safari will automatically download stuff, to your desktop, without asking you. Secondly, IE will load DLLS from the desktop, just because they happen to have the same name as some other DLL it is looking for. I think the bigger problem here is with IE, because it doesn't matter how the dll got on your desktop, it shouldn't be using it.
Re: (Score:3, Interesting)
If you disable active web content on your desktop (thus only allowing
Re: (Score:3, Informative)
Red herring. It's got nothing to do with "Active Desktop". It's just the way Windows executables typically look for .dll files -- starting with the current directory and then each path listed in the PATH environment var.
In this case the shortcut to IE is launching the program with the user's desktop as current directory. First of all, it shouldn't -- probably it should be one level up from, there, in the user's home directory. Second, MS might want to rethink the way they hunt for .dll files for system
Re: (Score:3, Interesting)
This is a longstanding Windows flaw. (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Re:This is a longstanding Windows flaw. (Score:5, Insightful)
Re: (Score:2)
Yes, that's a standard part of a social engineering attack. This does make social engineering attacks easier, and should be fixed (let's start by downloading to something like %PROFILE%\Downloads instead of the Desktop). This is similar to the problem where Safari on OS X
Re: (Score:3, Informative)
I'd call that a fundamental flaw with the Windows environment itself. It sounds like this "desktop" thing is used as both a temporary scratchpad for miscellaneous data from arbitrary untrusted sources, and as a repository for locally trusted executables. Someone at Microsoft needs to get it strai
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
If so, why is %PROFILE%\Desktop in %PATH%?
Oh, no, it's this one: "While this is true, the behavior of the "DLL Search Order" (when it's disabled) is to look for the DL
Re: (Score:1)
Perhaps it's because the Internet Explorer icon on the desktop is a special case, because of the browser-desktop integration?
Nah, that's crazy talk.
You're right. It is. If you set Firefox to be your Internet icon (from "Set Program Access and Defaults") Firefox could potentially do exactly the same thing - because the Internet icon is a special case (like My Computer, Recycle Bin, My Network Places, and My Documents).
The same issue could be raised using Windows Explorer (which has no integration with Internet Explorer).
Re: (Score:2)
Which is to say that it's the fault of browser-desktop integration, yesno?
Re: (Score:1)
Re: (Score:2)
Why, it was in 1997, when they started the whole browser-desktop integration mess.
Without that, they wouldn't have had any reason to treat it any different from any of the other apps they included on the desktop by default.
Especially since the browser does not integrate with the desktop
That's not what "browser-desktop integration" refers to.
Re: (Score:2)
Re: (Score:2)
Best Solution (Score:3, Interesting)
As soon as the attack centers on an Apple product, they'll start moving their ass. Until then, it's "not [their] problem".
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
As you say, the article is your friend.
"The Safari bug, originally disclosed on May 15 by security researcher Nitesh Dhanjani, allows attackers to litter a vi
Re: (Score:3, Insightful)
If it weren't for Safari downloading the files to the desktop by default, they wouldn't get there.
If it weren't for IE opening these files from the desktop by default, they wouldn't open.
Now, if you'll excuse me, I'd like to feel completely secure. I'm going to go install my old copy of OS/2 Warp v3 and Netscape Communicator.
Re: (Score:2)
Re: (Score:2)
Would this happen with Firefox? Would this happen with Seamonkey? I'm just wondering... I don't honestly know, because I don't use Windows...
It doesn't seem like Safari would turn off such a feature...
Re: (Score:1)
Re: (Score:2)
They've even decided to let us use exchange on the new iphones!
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
Sure, Safari (on Windows) can carpetbomb & spam your desktop. That's potentially annoying (but ultimately doesn't harm your system).
There's a distinction between Safari "making available" the malicious executable versus it actually being executed, which like I was saying, the person I was responding to
Dear Apple, Please stop sucking (Score:1, Insightful)
Re: (Score:2, Informative)
Second, this is about a Windows flaw that Safari has not addressed (rather Apple) in its current iteration. Apple's browser can be considered a "patsy" in this... and MS is trying to pass the buck (so to speak.)
Third, the "open safe files after downloading" is old news. Get a new schtick.
And Fourth, grow up. This isn't about Apple's security, it's about Microsoft's... and Apple's inability to prevent "stupid is as stupid does" on a Windows machine. They're good... just not mira
Re: (Score:2)
Second, how is "Safari will gleefully download whatever the hell you throw at it" not an Apple issue? IE doesn't do this. Firefox doesn't do this. It only happens with Safari. How again is this not Apple's fault? True, it's up to IE to run the files, but it's Safri that allows them to be put there in the first place. I'd say both are equally to blame.
Third, it's "old news" but it's still happening and it's still stupid. If there was
Re: (Score:1)
MSFT needs to fix this ASAP (Score:3, Interesting)
Regardless of what the default is in Safari or even Firefox, a user can still change that default to anything they want including the desktop.
As others have pointed out, the downloads folder is a Leopard specific feature used by Safari when running under Leopard and the executable warning thing is also a Leopard feature.
Who uses safari for windows and IE? (Score:4, Interesting)
Personally I think the bigger issue is that Safari will auto-download, auto-mark-safe, and auto-run files silently. IE's broken too, but either one of the players involved could render this exploit moot. Let's see who responds first before stoning someone to death.
I still don't see why someone would be browsing around in safari and then open up IE. A regular user's likely to only use his favorite browser and a dev who needs to view the same site in multiple browsers would probably notice that there're a bunch of new .dll files all over the desktop.
Re: (Score:2, Interesting)
But on my PC, I have mozilla as my default browser, but Picasa and Visual Studio still insist on using IE when it needs to do web stuff. I'm sure I could override that, but I haven't bothered.
IE being the system's browsers leaves it easy to be accidently opened, methinks.
But I'm in agreement that if Windows provides a mechanism for marking files as unsafe, it's Safari's fault for not taking advantage of that. Apple can't blame Microsoft of being at fault if they're not
Re: (Score:2)
Of course marking it as unsafe doesn't actually cause IE not to load it. So it is Microsoft's fault.
No, that makes it both their fault. Apple couldn't meet 'em halfway. Now all M$ has to do is release a patch so IE won't run stuff marked as unsafe and suddenly it's all apple's fault again. It's like if you're driving a car known to have insufficient brakes and you ram it, full speed, into a minivan full of nuns. You can say it's the manufacturer's fault for building a car with weak brakes, but if it's proven you didn't even try to use the brakes at all (no skidmarks, witnesses say no brake lights, in-ca
Re: (Score:2)
Of course marking it as unsafe doesn't actually cause IE not to load it. So it is Microsoft's fault.
No, that makes it both their fault. Apple couldn't meet 'em halfway. Now all M$ has to do is release a patch so IE won't run stuff marked as unsafe and suddenly it's all apple's fault again.
Sorry but you are not seeing the real issue. IE should not load dlls on the desktop whether they were downloaded there automatically, on purpose or dragged there by explorer.
That is a horrific design decision.
If MSFT just released a patch to not run files marked as unsafe, it would still be their fault. Loading dlls on the desktop regardless of how they are marked or how they appeared on the desktop is idiotic.
This cannot be Apple's fault since Apple did not tell MSFT to design a system that loads dl
Re: (Score:2)
Philosophical refutation is a bitter medicine in that it chases comfortable falsehoods from the mind, to paraphrase Plato. Is the carpet-bombing vulnerability not a bug? Would not fixing this bug render the exploit innocuous? How many parts does the material cause of the exploit have? How do you describe the efficient cause?
Re: (Score:2)
MSFT has only to fix this by preventing automatic loading of any DLL on the desktop by IE.
Reminds me of an old security issue... (Score:2)
In the Windows command prompt -- and I bet this behavior is inherited from DOS -- the current directory is included in the path. I'm pretty sure it's implicitly included -- that is, no way to disable it by editing %PATH%.
My understanding is, the main reason PATH works this way