Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Internet Explorer The Internet Bug Security

Open Source Firm Releases Patch for IE Bug [UPDATED] 544

An anonymous reader writes "An open source and freeware software development web site has released a patch to fix the URL spoofing vulnerability in Internet Explorer, which can be exploited by scammers who try to trick people into revealing details of online banking accounts or other private information." Naturally, the source for the patch is available as well. Update: 12/19 15:06 GMT by M : Sadly, the patch appears to contain a buffer overflow and some possibly-malicious code - see an analysis and news story, and this comment which suggests the patch author is trying to figure out who is taking advantage of the original vulnerability. Caveat patcher.
This discussion has been archived. No new comments can be posted.

Open Source Firm Releases Patch for IE Bug [UPDATED]

Comments Filter:
  • ... huh? (Score:2, Interesting)

    by TellarHK ( 159748 ) <tellarhk@@@hotmail...com> on Thursday December 18, 2003 @10:28PM (#7759930) Homepage Journal
    I can't even come up with a good joke for this. Seriously. It's just too good. Way, way too good.
  • Acceptance? (Score:2, Interesting)

    by xeno_gearz ( 533872 ) * on Thursday December 18, 2003 @10:29PM (#7759945) Journal
    This is great that they did this but perhaps resources would be better spent developing for Mozilla? It will be interesting to see how Microsoft react to this. Why is the group [openwares.org] releasing this on their own? Was Microsoft contacted?

    Unfortunately, with this being an unofficial release, I don't see many people likely to utilize this until it is released by Microsoft. In the meantime, I am enjoying reading this in Mozilla :)

  • by znode ( 647753 ) * <znode@noSPAM.gmx.de> on Thursday December 18, 2003 @10:30PM (#7759951) Homepage
    Without the original source to IE?
  • Good to know... (Score:4, Interesting)

    by TSR Wedge ( 732684 ) <wedge@wedgen[ ]us ['et.' in gap]> on Thursday December 18, 2003 @10:31PM (#7759954) Homepage Journal
    Good to know that while Microsoft is leaving its users hanging out to dry patch-wise, the community still cares enough to fix the problems. Who knows -- maybe we'll see more effective (i.e., fixing more problems than they cause) patches from here forward.
  • Ummm (Score:1, Interesting)

    by rabtech ( 223758 ) on Thursday December 18, 2003 @10:33PM (#7759978) Homepage
    I don't know about you folks, but this appears to redirect your request to their cgi script, which ostensibly will allow or deny it based on whether or not it is vulnerable.

    This looks like a horrible way to "fix" the problem.
  • by realdpk ( 116490 ) on Thursday December 18, 2003 @10:33PM (#7759981) Homepage Journal
    If you check the code, all it appears to do is redirect the browser to http://www.openwares.org/cgi-bin/exploit.cgi?URL if someone clicks on a bogus URL.

    The overpresence of "strcpy" is a bit unsettling, too.

    While it's a nice step, it's no replacement for an official Microsoft patch.
  • by epiphani ( 254981 ) <epiphani@@@dal...net> on Thursday December 18, 2003 @10:40PM (#7760033)
    Exactly what I was going to ask. How do you "patch" software without the original code? You'd basically have to reverse engineer the software, back to some other form of programming language - probably ASM.

    Now, just as a quick check, isnt reverse engineering any M$ product against the EULA? I seriously expect a lawsuit about this.

    Also, patching a binary - that requires *very* detailed knowledge of the binary itself, not? You cant just diff two binaries, and apply patches like that, can you? Run into adressing problems, not? I've never really studied the end result of my code beyond a little gdb'ing.
  • This will go far (Score:4, Interesting)

    by Ridgelift ( 228977 ) on Thursday December 18, 2003 @10:43PM (#7760055)
    While Microsoft has released an article providing details about the vulnerability, the company is yet to provide a patch.

    I hope this become a trend and attitude among the Open Source community. I must admit that I've been a Microsoft-hater for years, but over time I found that people are really put off by anti-corporation sentiments. I suppose it makes sense in a way; If I invested thousands in a technology for my business, I wouldn't want people telling me "Aw man! You got totally taken! Windows is total crap!"

    If the Open Source community begins patching Windows before Microsoft, not only does it help consumers deal with problems they can't solve, but it bring honor and respect to the Open Source community. Then when people consider Open Source, they're more likely to conclude that Open Source programmers are more competant than corporate programmers.

    It's a win-win-lose. Open Source wins, Consumers win, and Microsoft loses. Which is what I wanted in the first place.

    ESR's right in his article "How to Become a Hacker" [catb.org]

    Q: Do I need to hate and bash Microsoft?

    A: No, you don't. Not that Microsoft isn't loathsome, but there was a hacker culture long before Microsoft and there will still be one long after Microsoft is history. Any energy you spend hating Microsoft would be better spent on loving your craft. Write good code -- that will bash Microsoft quite sufficiently without polluting your karma.
  • by Anonymous Coward on Thursday December 18, 2003 @10:51PM (#7760113)
    people look at the source code, the strcpy is not copying a passed var.. its harmless..
  • Inept and free! (Score:5, Interesting)

    by fm6 ( 162816 ) on Thursday December 18, 2003 @10:56PM (#7760143) Homepage Journal
    Pretty sure this makes Microsoft look really inept.
    Since when have they needed any help with that?

    If people are doing open source IE patches, would somebody please fix this sucker [google.com]? Thousands of people are complaining about this bug online, yet MS hasn't even officially admitted its existence. Now that's inept!

  • by DrewBeavis ( 686624 ) on Thursday December 18, 2003 @10:58PM (#7760160)
    This is the beginning of a really bad precedent. It is bad enough that M$ makes bad software and takes too long to fix it, but this just makes it okay to keep doing that. M$ will know that now they don't even HAVE to fix it. Just wait and let the open source community do it. THEN, when multiple patches start conflicting because of reasons already mentioned above, M$ can blame open source as the problem. Heck, they might even 'embrace' open source for a time, then use this as justification that it open source doesn't work.
  • by El ( 94934 ) on Thursday December 18, 2003 @10:58PM (#7760163)
    Open source enthusiasts have TWICE paid to renew Microsoft's domain registries (once for hotmail, once for microsoft UK) when Microsoft forgot... so who should you trust with your data, the people that can't even remember to renew their own domain registrations, or the people that keep bailing them out?
  • by umofomia ( 639418 ) on Thursday December 18, 2003 @10:59PM (#7760175) Journal
    Exactly what I was going to ask. How do you "patch" software without the original code? You'd basically have to reverse engineer the software, back to some other form of programming language - probably ASM.

    Now, just as a quick check, isnt reverse engineering any M$ product against the EULA? I seriously expect a lawsuit about this.

    Actually they didn't have to do that... they just redirect the URLs you click on into their own cgi script off on their server to determine if it's a valid URL.

    I don't know about you, but I prefer that the URLs I go to not be sent to some random server out there. Isn't this basically the definition of spyware!? Also, what happens if their server goes down? Does that mean I'm unable to browse the web at all?

    Wait for Microsoft to come out with a better fix that properly addresses this issue.

  • using the API (Score:5, Interesting)

    by ramzak2k ( 596734 ) on Thursday December 18, 2003 @11:01PM (#7760179)
    If i am correct all microsoft applications do have allow access to APIs (Application Programming interfaces). I have written a simple application in Visual Basic once that used the API of MSN instant messenger to listen to the messages sent to me and do a custom auto reply saying things like "i will be back in a few mins".

    Once someone has a grip of IE's API, this shouldnt have been too difficult - after all they just check if the URL requested for(which should be triggering an event in the API) has a particular type of input. If so they redirect it to a different URL (their own website).

    If the patch has been done this way it is more reason not to apply it - it is not exactly the cleanest way to fix it.
  • by Dirtside ( 91468 ) on Thursday December 18, 2003 @11:23PM (#7760309) Journal
    so who should you trust with your data, the people that can't even remember to renew their own domain registrations, or the people that keep bailing them out?
    Much as I hate Microsoft, this is not a rational argument. The guys who wrote this "patch" are not the ones who paid for Microsoft's domain registrations. Yes, I want Redmond to fall into a giant sinkhole, but irrational, zealous logic doesn't help anyone.
  • by CaptBubba ( 696284 ) on Thursday December 18, 2003 @11:28PM (#7760337)
    I actually don't see any mention of the GPL on any of the pages, or in the downloadable source.

    Doesn't this mean that nobody else is allowed to distribute it? I mean, MS could still get in a whole lot of trouble for inclusing this code in its patch, but they wouldn't risk losing source code.

  • Opera (Score:4, Interesting)

    by 10scjed ( 695280 ) on Thursday December 18, 2003 @11:55PM (#7760469) Homepage
    Opera7.23- not only is it not vulnerable to this exploit, it pops up a dialog box to advise you're being redirected to a user@ address (and shows the real address in the bar).
  • Over hyped. (Score:5, Interesting)

    by jag164 ( 309858 ) on Friday December 19, 2003 @12:00AM (#7760490)
    First of all. This 'patch' isn't too extrodinary. This is a plugin similar to the google bar. There is no reverse engineering, thus no threat of DMCA. It's really not a patch, it's more of a work around. It's also a publicity stunt. Upon detecting a spoof, there should me no reason to go to the 'patch makers' website for info when it could be done within the plugin.

    Second, it's a horrible precedent for closed source software. Let close source fixed close source. This may seem like a good thing(tm) for the OSS communtity, but you know damn well that not-so-good-intentioned 'patches' will soon follow. Post some source on a site, provide an EXE(that of course didn't come from the source) and you've fished in countless joe users before the real word is out that a copy cat has duped you. Too late for some.

    I can only see bad things(tm) coming from this idea. Geeks know who and what to trust, but Joe User doesn't. And when joe user screws up it screws us all.

    The sum: This may have a greater negative impact in the long run then the good one it was intended to have.

  • Re:Acceptance? (Score:4, Interesting)

    by daniel23 ( 605413 ) on Friday December 19, 2003 @12:11AM (#7760601)
    I think mozilla misrepresents the url in the status line while the address line shows the url correctly.
    MSIE, on the other hand, fails completly.

    In fact, on some versions of mozilla you even can spot a control char in the status line, too. But real spoofing depends on the address line.

    heise (German) [heise.de]

    As a test:
    http://www.mozilla.org%00@www.heisec.de [heisec.de]

    is shown as http://www.heisec.de in mozilla, while msie puts http://www.mozilla.org into the address line.

  • by Vilim ( 615798 ) <ryan.jabberwock@ca> on Friday December 19, 2003 @12:12AM (#7760612) Homepage
    Now if a benevolent open source firm would make a patch that gave IE PROPER PNG support, then I would be very grateful (I have been swearing at IE's lack of png support for the last hour for messing up my very cool website design)
  • Re:... huh? (Score:5, Interesting)

    by BiggerIsBetter ( 682164 ) on Friday December 19, 2003 @12:15AM (#7760635)
    Or maybe Microsoft will figure it doesn't need to provide patches in a timely manner, because the user community will do it for them.
  • Re:Inept and free! (Score:2, Interesting)

    by Grim Grepper ( 452375 ) <Andrew275@gmail.com> on Friday December 19, 2003 @12:26AM (#7760719) Homepage
    Or better yet, fix the problem that's been around for years, where IE can't even display PNGs with alpha transparancy. I'd love to be able to use them instead of cruddy 256 color GIFs, but I can't because of IE.

    And yes, I know about the various bits of Javascript and CSS that allow IE to show them, but it shouldn't have to be done in the first place. And none of them completely work.
  • Re:... huh? (Score:4, Interesting)

    by hdparm ( 575302 ) on Friday December 19, 2003 @12:32AM (#7760777) Homepage
    Exactly. This is only good for Microsoft. They've got their ways of convincing masses why anything that comes out in press is actually good and why is Microsoft the one to praise.

    They have thousands of programmers, let them move their butts and do their fucking job. More holes in IE, easier to convince people to switch to Mozilla.

  • by kupci ( 642531 ) on Friday December 19, 2003 @01:25AM (#7761198)
    Granted, not your average programmer can do this, and yes you're right, it does take detailed knowledge, and a little familiarity with assembly.

    Microsoft, in it's efforts to steer people away from FoxPro to Access, many years ago, decided to not bother patching some serious issues with FoxPro. What happened was there was a very poor piece of code that tried to figure out how fast your processor was when FoxPro started up, I forget exactly what it was for, but the programmer(s) made a small bug where if the processor was extremely fast, the value would be set to -1, and FoxPro would promptly crash. Worked fine for years until some of the new processors came out.

    Anyway, Microsoft stalled on fixing this timing issue bug, so some smart fellow tweaked the exe file to fix it. Yeah, not even assembler, we're talking hex. Pretty damn cool.

  • by kupci ( 642531 ) on Friday December 19, 2003 @01:55AM (#7761394)
    For one thing, it's an IE add-on (similar to a GoogleBar and others), not a patch. So it's a messy solution to begin with.

    There's a saying for this: crap built upon crap.

    There they allocate a string of 256 bytes, but never even bother to clean it up! I'm not even sure if that memory is going to be cleaned up when you close all the IE windows, since it's really a Windows system component ...[more scary windows stuff]

    Seems like a combination of the lousy design of the Windows components coupled with using C. Long, long time since I've worried about destroy and the like, what with the availability of better languages like Java, etc. Granted once buffer overflows are a thing of the past, there will be new holes, but at least we will be moving forward.

    But even that's not the worst thing. Their code actually contains a buffer overflow, allowing the attacker to execute code on your machine with the privileges of the IE process just by crafting an invalid URL link and getting you to click on it!

    Good catch. So one security flaw fixed, opening up another flaw - a little embarrasing, except MSFT did the same thing a few weeks ago in their flurry of untested patches. But it does show the inherent advantage of open source in that *anyone* can review the code, and fix it, without resorting to messy hacks such as this.

  • Re:RTFC (Score:4, Interesting)

    by Holi ( 250190 ) on Friday December 19, 2003 @03:31AM (#7761886)
    I disagree. Just be3cause something is open source (as in they offer the source with the binary) does not mean it must be GPL (freely ditributable (ok nevermind the really poor spelling)). GPL is not the only open source license. In fact I wish more commercial software were like this. It would make security auditing much easier. Yes I cannot use their code in my projects but at least I could have some trust in their programs.
  • Re:Hey, morons (Score:5, Interesting)

    by Anonymous Coward on Friday December 19, 2003 @03:50AM (#7761963)
    hmm...
    In ::BeforeNavigateEvent (IETray.cpp)
    It copies the string to a MBCS buffer, and scans for %01, %02, and %DA. If none of these exist, the rest of the function is skipped. Don't see how this phones home.

    Of course, the strings is malloc()ed but never free()ed... But that's another matter. That and for some reason they don't just use all-unicode (use wcsstr() etc.)... What if I wanted to surf to a site with a character that is not in the current code page? (e.g., search for Japanese text on Google using an English O/S) (Note that IE has the option of always sending the URL in UTF-8, so it has to be able to deal with characters not in the ACP)
  • by llauren ( 80737 ) on Friday December 19, 2003 @04:46AM (#7762152) Homepage

    Is the "@-spoof" really a spoof? According to RFC2396 [rfc-editor.org], section 3.2.2 "Server-based Naming Authority", this is a feature of the URI and not a bug or a spoof.

    Certainly it can be made to fool even an enlightened user, but isn't it wrong to cripple a browser's ability to adhere to the "Uniform Resource Identifiers (URI): Generic Syntax" RFC -- and even more so with spyware ;)

    Browsing the "test page" [openwares.org] at Openwares with my Konqueror gives me the spoof page. Good. That just means that Konqueror is RFC2396-compliant (but should i patch anyway? ;).

    I first came across this "bug" about two years ago when i was forwarded an "authentic" page from Microsoft Support: Q209354 - HOWTO [weblogs.com] (mirror). It took me a while to realize that nobody at M$ was going to be fired for this type of creativity.

    See The Reg for an article [theregister.co.uk] for some coverage -- although the host hwnd.net is off the net, so you can't really try to get spoofed.

    • ~llauren
  • Re:Acceptance? (Score:3, Interesting)

    by Kymermosst ( 33885 ) on Friday December 19, 2003 @05:09AM (#7762222) Journal
    To quote the wise sages of the Quake 3 voiceover...

    HUMILIATION!


    I figured what Microsoft was thinking was more like one the one that came with one of the newer point releases:

    HOLY SHIT!

    (It happens when you get gibbed when you are really close to capturing the flag. I about fell out of my chair the first time my machine spouted out "HOLY SHIT!" when playing Q3. I had the volume way up, too.)

    Humiliation probably set in a little later...
  • by Zog The Undeniable ( 632031 ) on Friday December 19, 2003 @05:52AM (#7762388)
    No corporates are going to risk installing it, since it didn't come out of Redmond. And home users who give enough of a stuff about security to realise that IE has problems are probably using Mozilla or Opera.

    On a related topic, did anyone else notice that chrome-free popups are to be terminated in XP SP2 (announced yesterday)? They're a great technique for the site spoofers since you can have the whole shebang - genuine looking URL *and* a nice little SSL padlock. Simply use a screenshot of a real online bank as the background and stick your own HTML form on top to capture the login details. JavaScript aficionados can even make the address bar and toolbar work like the real thing, if they see fit. Thankfully the Russian mafia aren't that sophisticated...yet.

  • Very Dangerous Patch (Score:2, Interesting)

    by cipset ( 550887 ) on Friday December 19, 2003 @08:22AM (#7762860) Homepage
    According to Heise Security www.heise.de this patch actually builds up bigger security holes than it repairs

    In german:

    http://www.heise.de/newsticker/data/dab-19.12.03-0 02/ [heise.de]

    Actually the have also a test for those who already patched their systems with this:

    [heise.de]
    http://www.heise.de/security/dienste/browserchec k/ demos/ie/e5_18.shtml

    So do not use this patch!

  • Re:Hey, morons (Score:3, Interesting)

    by arkanes ( 521690 ) <arkanes@NoSPam.gmail.com> on Friday December 19, 2003 @08:45AM (#7762933) Homepage
    It actually changes faked URLS to a url pointing at thier home page - this page may simply do a redirect or it might be an alert page letting the user know that they were about to be spoofed (probably the latter). It's not really "phoning home" per se, but the certainly could (and probably do) track traffic to that page to try to analyze the use of this exploit.

    That said, I'm not real impressed with this "patch" - theres alot of use of c-style string work in a C++ file, which is silly, and more than that it's not even safe use of c-strings - the file concatenation of the URL together involves just using strcat() (not even strncat()) without any sort of length or sanity checking on the buffer.

  • Mozilla? (Score:1, Interesting)

    by Anonymous Coward on Friday December 19, 2003 @08:54AM (#7762964)
    And did someone fix this bug in Mozilla yet? Mozilla 1.5, last I checked, was vulnerable to half of this bug. The address bar at the top of the screen would display the correct full address, however hovering over a link would stop at the %00.

An authority is a person who can tell you more about something than you really care to know.

Working...