[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] HAURI live update. Arbitrary remote file download and execute vulnerability
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] HAURI live update. Arbitrary remote file download and execute vulnerability
- From: Park Gyutae <saintlinu@xxxxxxxxxxx>
- Date: Tue, 26 Jul 2005 17:52:50 +0900 (JST)
Dear F/D Mailling
-----------[Cut Cut]--------------------------------
Title: HAURI live update. Arbitrary remote file download and
execute vulnerability
Discoverer: Original discoverer Neo
Original exploit improver PARK, GYU TAE
(saintlinu@xxxxxxxxxxxxx)
Advisory No.: NRVA05-03
Critical: High Critical
Impact: Arbitrary file download from Internet and executable
Where: From remote
Operating System: Windows Only
Solution: Patched
Affected S/W:
http://update.nprotect.net/newlivecall/engine/livecall.cab#version=2004,6,25,1
by Neo
http://fx.HAURI.net/HProduct/livesuite/XXXXXXX/CLIENT/LiveSuite/web/HLiveRobotWeb.cab#version=2005,6,21,1
by Saintlinu
Notice: 06. 29. 2005 initiated
06. 30. 2005 2ND No response
07. 05. 2005 Vendor responded and will be patched until 07.
22. 2005
07. 21. 2005 patched
07. 26. 2005 Disclosure vulnerability
Description:
HAURI is an anti virus vendor in Korea
The livesuite offers services to users scanning and treating virus, worm, hack
tools and so on from Internet
See following detail describe:
[The first half]
Neo discovered vulnerability at
http://update.nprotect.net/newlivecall/livecall.html
HAURI never check parameters When updates from Internet update server
also HAURI never check file's checksum or hash value.
He modified liveup.haz file, it's live update configuration file
that file just compressed by ZIP compressor.
if HAURI user access phishing page such as can use BBS that has vulnerability
such as cross site script
then evil software downloaded without any restrict
evil software like cmd.exe if exist then HAURI overwrites.
[The latter half]
As you seen above. Saintlinu improved Neo's exploit.
Saintlinu found HAURI LIVE UPDATE program at XXX Commercial companies in Korea
HAURI checked files in liveup.haz but that's all.
File's checksum is date and time when it made
therefore we can exploit that vulnerability.
Technical Describe:
NOT INCLUDED HERE
-----------[Cut Cut]--------------------------------
I higher respect Neo
Special thanks for My best group Null@root.
PS. I'm very sorry for poor my konglish
---------------------------------
무료 1GB용량!, 더이상 용량 고민없는 야후! 메일을 써보세요.
대한민국
블로그가 모인 곳!
피플링에서 네이버, 이글루스를 만나다
야후! 모바일
최신 휴대폰 정보, 벨소리, 캐릭터, 문자메세지
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/