Running Firefox or Opera as a default browser won't save you from unpatched Internet Explorer vulnerabilities—a fact made explicit when a researcher showed how easy it is to put HTML inside files supported by Windows Media Player.

Researcher Petko D. Petkov said in a Sept. 18 blog posting that he's found that a fully patched Windows XP Service Pack 2 system running Internet Explorer 6 or 7 along with Windows Media Player 9—the default, although the media player is now up to Version 11—will open any page of an attacker's choice even if the default browser is not Internet Explorer.

The broader implication is that even users who think they're safe because they don't run IE are exposed to any IE vulnerabilities out there, Petkov said. This is true not only for Windows Media Player users but also for those who run Skype, GTalk and AIM, given that those applications all use IE for rendering incoming and outgoing messages, he told eWEEK in an e-mail.

"Many users don't realize that they are running IE most of the time, although their default browser is Firefox, Opera, Safari or whatever it might be," he said.

The preferred browser for Windows Media Files is also IE, given Microsoft's proprietary formats, he said. "Therefore, a movie running in Windows Media Player will use no other browser but IE itself, regardless of your settings," he said. In other words, running a fully patched version of Firefox with an unpatched version of IE is just as big a security gamble as running unpatched Firefox.

He gave this example: Firefox opens a security confirmation box when the attacker wants to launch an application through a URL handler. IE does not. However, attackers can force a page to open in IE, thereby opening an external application and enabling them to launch an attack such as a Second Life exploit he described earlier the week of Sept 17.

Such an attack can be embedded inside a Windows Media Player meta file, he said. "Even if you are a Firefox user, the attack will work. Of course you have to open the meta file first."

Petkov said the vulnerability can be used in some "very, very interesting" phishing attacks. He himself prepared a simple proof of concept that spawns a window in full-screen mode, noting that it would be simple to fake a Windows log-out/log-in sequence to phish credentials from victims.

Petkov has been on a roll lately when it comes to the hidden dangers he sees in so-called "media meta files." One such media meta file is QTL, the format that was exploited in a recent QuickTime vulnerability he discovered. (Mozilla fixed the QuickTime vulnerability in Firefox on Sept. 18, but Apple has yet to fix the primary QuickTime flaw.) Other media meta files include ASX, a format that he's working to bring attention to now, saying that problems "could easily emerge" with the format.

Petkov told eWEEK that the best way to protect a system from the Windows Media Player vulnerability is to upgrade to Windows Media Player 10 or 11.

Check out eWEEK.com's Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK's Security Watch blog.

Copyright (c) 2007 Ziff Davis Media Inc. All Rights Reserved.
September 19, 2007
By  Lisa Vaas
http://www.eweek.com/print_article2/0,1217,a=215558,00.asp
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()