Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Microsoft

Microsoft Security Patch Fixes URL Security Flaw 545

loteck writes "Microsoft has just released Security Update 832894. According to their official information, it affects all NT kernel versions of Windows and most versions of Internet Explorer. Here's a rundown of the important fixes, notably 'A vulnerability that involves the incorrect parsing of URLs that contain special characters' in Internet Explorer, as previously discussed on Slashdot."
This discussion has been archived. No new comments can be posted.

Microsoft Security Patch Fixes URL Security Flaw

Comments Filter:
  • by seigniory ( 89942 ) <bigfriggin@@@me...com> on Monday February 02, 2004 @07:19PM (#8164230)
    So why is MS posting this? Nothing in this seems like it can't wait 8 days...

    Oh and for all of you who don't use Windows SUS - why not? I'm going to patch 350 machines with 5 clicks later this week. Stop your bitchin and get better tools.
  • by Coryoth ( 254751 ) on Monday February 02, 2004 @07:21PM (#8164260) Homepage Journal
    I was under the impression that their fix was simply make http(s)://user:password@www.address.net invalid. If so, that's not so much a fix, as just deciding to break some functionality. Can someone confirm that this is what the "fix" actually is?

    Jedidiah
  • by wasabii ( 693236 ) on Monday February 02, 2004 @07:22PM (#8164269)
    Because SUS requires you to run IIS. :) Nuff said. Not all of us run 100% Windows Domains with Active Directory and IIS and servers.
  • Re:Does this mean (Score:5, Informative)

    by SultanCemil ( 722533 ) on Monday February 02, 2004 @07:23PM (#8164282)
    Wait mozilla supports HYPERLINKS? wow. I do need to upgrade my browser.

    Seriously, though - I think one of the bigger changes in this release is that IE no longer support username/password in the URL (http://me:you@whatever.com). No more easy pr0n surfing.

  • by pbur ( 88030 ) on Monday February 02, 2004 @07:23PM (#8164290)
    It is exactly that. Breaking RFCs. I forget the number, but someone posted it in the last slashdot article about this.

  • by Whyrph ( 620050 ) on Monday February 02, 2004 @07:29PM (#8164346)
    Regular Mozilla, while a bid slower than Firebird, has an IE theme [mozdev.org].
  • by Anonymous Coward on Monday February 02, 2004 @07:31PM (#8164361)
    It doesn't... from the second link in this post, [microsoft.com] "This issue affects Internet Explorer, a component of Windows".

    The poster was somewhat ambiguously referring to the versions of Windows that were affected, not the area of the system that was.

  • by Squarewav ( 241189 ) on Monday February 02, 2004 @07:38PM (#8164421)
    I was under the impression that their fix was simply make http(s)://user:password@www.address.net invalid. If so, that's not so much a fix, as just deciding to break some functionality. Can someone confirm that this is what the "fix" actually is?
    That method of user/password should have never been alowed in the first place. Sure its easy but come on, yah broadcasting your username and password to every node along the way is such a good idea, saves some trouble of pharseing the html. not to mention any spyware that sends back what you type into the adress bar
  • by spydir31 ( 312329 ) <hastur@noSpaM.hasturkun.com> on Monday February 02, 2004 @07:39PM (#8164435) Homepage
    Opera sez:
    Security warning:

    You are about to go to an address containing a username.

    Username: fubar
    Server: slashdot.org

    Are you sure you want to go to this address?

    OK Cancel
    (there is no option to disable)
  • Re:the needed patch (Score:5, Informative)

    by Trogre ( 513942 ) on Monday February 02, 2004 @07:40PM (#8164450) Homepage
    Reality is, Mozilla is a far way from replacing I.E.

    Perhaps so, but I use the web for business and recreation on average 6 hours a day, and have never in the last three years had to resort to IE.

    Except, that is, for ensuring that web pages I write render correctly on the lowest common denominator.

  • Re:the needed patch (Score:2, Informative)

    by slash-tard ( 689130 ) on Monday February 02, 2004 @07:42PM (#8164463)
    Not to be redundant, But I use Etrade for banking and stocks and it works fine in Safari and Mozilla. I have also used Ameritrade, and I uses several financial sites for work.

    I use several different email and news sites regularly and havent found any that dont work right.

    Some will occasionally have very minor display issues.

    MSN/MSNBC will have features that dont support other browsers but thats to be expected from MS.

    *BTW Explorer is my preferred browser on my XP machine.
  • Re:Does this mean (Score:5, Informative)

    by interiot ( 50685 ) on Monday February 02, 2004 @07:43PM (#8164478) Homepage
    Huh. I had kind of assumed that the username/password was part of the official URI spec, but apparently not [w3.org]:
    • httpaddress
      • h t t p : / / hostport [ / path ] [ ? search ]

      ftpaddress
      • f t p : / / login / path [ ftptype ]

      login
      • [ user [ : password ] @ ] hostport

      hostport
      • host [ : port ]
  • by cliveholloway ( 132299 ) on Monday February 02, 2004 @07:46PM (#8164503) Homepage Journal

    I've been using Bofa online banking [bofa.com] for over a year now with Firebird with NO problems except one small CSS issue that appears when setting up a payee in Bill-Pay.

    Instead of complaining about banks that recommend IE, move to BofA and tell your existing bank why you are moving!

    "Blah blah, status quo, what can you do?"... as soon as it hurts their pockets, they'll add Mozilla support.

    Don't just move for the tech though - the BofA system is very well thought out and feature rich and sells itself pretty well. I now pay all my bills through it. It even let's you send payments to individuals (I assume it mails them a check - never used it). I'm now down to writing 4 checks a month, and am hoping to eliminate those soon (I think my wife's going to take a little more coaxing though before she kicks the habit :).

    cLive ;-)

  • Re:the needed patch (Score:2, Informative)

    by LordKazan ( 558383 ) on Monday February 02, 2004 @07:47PM (#8164509) Homepage Journal
    Except, that is, for ensuring that web pages I write render correctly on the lowest common denominator

    Same here - i work for Ames Lab (not NASA AMES, Dept of Energy Ames Lab in Ames, IA) - im the new webmonkey for the condensed matter physics page (http://cmp.ameslab.gov -- the current version of the page is NOT my work) I switch between Opera, IE and Mozilla for testing - but for my browsing needs it's been straight netscape/mozilla since the internet was invented -- not _once_ have i had a problem accessing banks, etc using Mozilla -- funny thing is my own community CC had more problems with IE users than netscape/mozilla users - N/M always comes with 128bit crypto, that wasn't true for IE until relatively recently, they'd have users locked out how having lame [sub-par] crypto.

    I occasionally run into sites that are IE-only - they're typically M$ cronies sites, etc -- and when they're not and it's just surely ignorance I give the webmaster a [polite] earful and generally the problem get's fixed.

    BTW: Hurray for IE actually conforming to the DOM2 standard finally - i don't have to write seperate drop menu JS code for IE, NS/Moz and Opera
  • Re:Which standard? (Score:3, Informative)

    by loconet ( 415875 ) on Monday February 02, 2004 @07:55PM (#8164580) Homepage
    Actually yes, It's RFC 2396 [faqs.org].

    Mozilla and I'm assuming Firebird do have this functionality.

  • RFC 1738 (Score:5, Informative)

    by BSDevil ( 301159 ) on Monday February 02, 2004 @07:58PM (#8164614) Journal
    Turns out this behaviour is specified in RFC 1738 (Uniform Reasource Locator), where it defines a URL as being of the form:

    //<user>:<password>@<host>:<port>/<url-pa th>

    Although the RFC does go on to stipulate that "[s]ome or all of the parts '<user>:<password>@', ':<password>', ':<port>', and '/<url-path>' may be excluded." Oddly enough, this form is broadly defined as being the general form of URLs, but is not the form of HTTP URLs (which lack the username and password). The RFC seems to indicate that this functionality was designed with FTP in mind - anyone know if MS disabled it for all URLs, or just http ones?
  • by antdude ( 79039 ) on Monday February 02, 2004 @07:58PM (#8164615) Homepage Journal
    You can read the details here [broadbandreports.com] and here [broadbandreports.com] (original thread). It was caused by an update released back in November 2003.
  • by value_added ( 719364 ) on Monday February 02, 2004 @08:01PM (#8164645)

    "...the RFC specification says that http authentication is not allowed in a http url, it is allowed in a generic URI but not for HTTP urls, this is an exception! RFC 1738 - Page 8

    3.3. HTTP

    The HTTP URL scheme is used to designate Internet resources
    accessible using HTTP (HyperText Transfer Protocol).

    The HTTP protocol is specified elsewhere. This specification only
    describes the syntax of HTTP URLs.

    An HTTP URL takes the form:

    http://<host>:<port>/<path>?<searchpart>

    where <host> and <port> are as described in Section 3.1. If :<port>
    is omitted, the port defaults to 80. No user name or password is
    allowed.

    So, Microsoft is in fact sticking to the RFC this time, something they should have done long time ago. I have been blocking this "http authentication" in every mail I received on my domain for over a year, but when I saw the IE url obfuscation issue a few weeks back, I was amased that nobody knew this, so I thought I was wrong and that's why I didn't reply. Microsoft still gets a "D" from me for this big mess!"

  • Re:Does this mean (Score:5, Informative)

    by pen ( 7191 ) on Monday February 02, 2004 @08:01PM (#8164646)
  • by chrisgeleven ( 514645 ) on Monday February 02, 2004 @08:08PM (#8164713) Homepage
    My university uses an Exchange 2003 server for its e-mail. Well apparently this patch breaks logon using Outlook Web Access on that server. Turns out the username and password is in the URL being sent to the server, the same thing this patch kills.

    Not sure if this is the way it is with every Exchange server or if it is how my university's server is configured, but if you use OWA you might want to be careful with this patch.
  • by Joe5678 ( 135227 ) on Monday February 02, 2004 @08:10PM (#8164743)
    ...is the text of the update on Microsoft's Software Update Services service...

    "...For example, an attacker could run programs on your computer while you view a Web page. This affects all computers with Internet Explorer installed (even if you don't run Internet Explorer as your Web browser)..."

    although there's no mention of that in the KB article.
  • by Otto ( 17870 ) on Monday February 02, 2004 @08:17PM (#8164806) Homepage Journal
    Yes, but they did provide warning:

    http://support.microsoft.com/default.aspx?scid=k b; [LN];834489

    Note that this KB article was changed today to reflect that it is indeed in this patch, however, this article has been up since Early January or so...

    Not that I think it's the right way to do things, but they did provide some warning that it was coming.
  • by Penguinshit ( 591885 ) on Monday February 02, 2004 @08:18PM (#8164817) Homepage Journal

    From the alert:

    * For example, an attacker could create a link that once clicked on by a user would display http://www.tailspintoys.com in the address bar, but actually contained content from another Web Site, such as http://www.wingtiptoys.com. (Note: these web sites are provided as an example only, and both redirect to http://www.microsoft.com.)

    The link "tailspintoys.com" actually goes to "tailspingtoys.com" (which is not resolved at all).
  • by Zocalo ( 252965 ) on Monday February 02, 2004 @08:27PM (#8164886) Homepage
    "Score:5, Funny"? Unfortunately MemRaven isn't joking - I got one of these things too, from Korea in my case although the standard of English and spelling in the body makes me the the origin was the US. Here's the body, so you can see for yourself - the Subject was "Microsoft Security Update KB872446":
    Dear Valued User!

    At 2 : 12 Eastern Time on Friday-January 30, 2004,
    Microsoft started investigating reports of a variant of a new worm "Novarg", known as Mydoom.B.

    This virus reportedly blocks access to some websites, including all Microsoft.com websites. The virus is noticed to entice mail recipients into opening a message that has a file attachment.
    If the attached file is opened, worm installs malicious code on the computer user's system and sends itself to any contacts in the user's address book.

    Please download the latest security patch available from Microsoft.com website or download this digitally signed attachment.

    message#875438809032

    Customer Service.

    VINA MATSUO
    MATSUO@microsoft.com

    In addition, there was a set of spoofed SMTP headers from the genuine Microsoft outbound SMTP server used for their security bulletin newsletter. Naturally, the attachement (called "Windows-KB823989-x86-ENU.exe") was not "digitally signed", and was infact a trojan - bet you never saw that coming!

    All in all, *very* slick. It plays on the current hype about MyDoom and the combination of the spoofed headers, "digital signing" and the offer to download from the website instead are/were no doubt sufficient to lull many who might not otherwise be taken in into the trap. The clueless n00bs who actually click on these things anyway would have had no chance. I'm actually impressed with the effort - this rank amatuer [theregister.co.uk] sure could learn a thing or two.

  • Re:Does this mean (Score:5, Informative)

    by Holi ( 250190 ) on Monday February 02, 2004 @08:29PM (#8164901)
    No for http requests the username and password are NOT allowed.

    RFC 1738 - Page 8
    3.3. HTTP

    The HTTP URL scheme is used to designate Internet resources accessible using HTTP (HyperText Transfer Protocol).

    The HTTP protocol is specified elsewhere. This specification only describes the syntax of HTTP URLs. An HTTP URL takes the form:

    http://(host>):(port)/(path)?(searchpart)

    where and are as described in Section 3.1. If : is omitted, the port defaults to 80. No user name or password is allowed.

  • Re:RFC 1738 (Score:5, Informative)

    by dzym ( 544085 ) on Monday February 02, 2004 @08:29PM (#8164908) Homepage Journal
    Confirmed to still work for FTP.
  • Re:the needed patch (Score:2, Informative)

    by Curtman ( 556920 ) on Monday February 02, 2004 @08:38PM (#8164985)
    And how about "Bookmark This Group of Tabs". That feature just rules. You can make a bookmark that opens a bunch of tabs at once.
  • by WD ( 96061 ) on Monday February 02, 2004 @08:40PM (#8165007)
    For starters, the MS page does not list Windows Me at all in the list of supported operating systems. But checking on my parents' machine (WinMe), that very cumulative IE update is listed on WindowsUpdate. I installed the update and here's how IE now behaves.

    When going to *any* URL with an "@" in it, IE will come up with an error page titled "Invalid Syntax Error" with the content:
    The page cannot be displayed
    The page you are looking for might have been removed or had its name changed.


    Once that error message is on the screen, any attempt to go to another URL with an "@" in the screen (by clicking on the URLBar and pressing enter, or typing in a different URL with an "@" in it) will cause IE to clear the page area to go blank and the throbber will continue spinning indefinately.

    This makes it appear that there is some sort of network connectivity problem, or that IE is somehow hung up. Typing in a normal URL will show that everything is fine.

    Also, this update doesn't fix the bug where IE displays an incorrect value in the status bar, such as this one: this one [secunia.com].
    (Though clicking the link on that page will fail with the above described error page)
  • by Anonymous Coward on Monday February 02, 2004 @08:43PM (#8165028)
    Ok, found the facts. It's hidden under Security Update Information then you have to unhide File Information. There find an OS and unhide it to show the list of dlls patched. None look like kernel stuff to me.

    Browseui.dll Mshtml.dll Shdocvw.dll Shlwapi.dll Urlmon.dll Wininet.dll

  • by bertnewton ( 686123 ) on Monday February 02, 2004 @08:59PM (#8165170)
    It must just be your university. OWA 2003 does not send the username/password in the URL, and I can confirm that our OWA is still functioning perfectly after applying the patch.
  • by Anonymous Coward on Monday February 02, 2004 @09:00PM (#8165177)
    Go to http://www.microsoft.com/security/security_bulleti ns/20040202_windows.asp [microsoft.com].

    Expand the section "Security Update Information".

    Expand the section corresponding to the version you have.

    You will see a table like the following:

    Date Time Version Size File Name Platform
    22-Jan-2004 00:21 6.00.2800.1400 1,026,048 Browseui.dll X86
    22-Jan-2004 00:19 6.00.2800.1400 2,795,520 Mshtml.dll X86
    22-Jan-2004 00:15 6.00.2800.1400 1,339,904 Shdocvw.dll X86
    21-Jan-2004 23:18 6.00.2800.1400 395,264 Shlwapi.dll X86
    22-Jan-2004 00:20 6.00.2800.1400 484,352 Urlmon.dll X86
    22-Jan-2004 00:16 6.00.2800.1400 588,288 Wininet.dll X86

  • Re:It was updated (Score:5, Informative)

    by Zeinfeld ( 263942 ) on Monday February 02, 2004 @09:44PM (#8165501) Homepage
    No usernames/passwords are allowed. It's funny in this situation MS is the only one following the RFC

    The security problem was spotted back in 1993 or 1994.

    The problem was that the URI group was way out in hyperspace by then and not doing what people needed. There was an inordinate amount of effort went in to gopher URLs, the gopher losers wanted to have / be a normal character because it could appear in a Mac filename. The point about escape characters was lost.

    Most browsers killed gopher because the protocol was so insecure, you could use a gopher URL to send any string you wanted to any port you wanted, ditto for finger.

    The URIs that got used in practice were mostly the ones defined in Netscape. They did not give a wetslap for standards from the IETF or W3C, as far as they were concerned they defined the standard. They did not care much about security either, well not until it started to go embarrasingly wrong.

  • by Anonymous Coward on Monday February 02, 2004 @10:27PM (#8165797)
    While RFC 2396 is indeed more recent, it covers a different topic than RFC 1738 does, and therefore doesn't automatically supersede it (it may "update" RFC 1738 on certain points, as is stated in the document header). RFC 2396 only describes Uniform Resource Identifiers in general; it doesn't go into detail for each and every scheme.

    However, there is a more recent specification for the HTTP scheme, and that is RFC 2616 (describing HTTP/1.1). It agrees with RFC 1738: No "userinfo" part is allowed in an HTTP URL. And, since RFC 2616 is more recent than RFC 2396, it can't be superseded by RFC 2396 (but neither does it supersede RFC 2396).
  • by DotNetGuru ( 704728 ) on Monday February 02, 2004 @11:42PM (#8166228)
    Except 2396 no longer covers the specific URL scehemes (refer to section G.3), so you gotta find some other RCF that says IE sucks.
  • Re:Prove? (Score:3, Informative)

    by Xenographic ( 557057 ) on Tuesday February 03, 2004 @12:28AM (#8166454) Journal
    With ActiveX, there have been a number of times when visiting a malicious page in IE could have destroyed your computer (e.g. something equivalent to rm -rf /)

    It is the only browser wherein I can remember such a hole, and I (try) to keep up with the security mailing lists...

    Feel free to search bugtraq if you like.

    Now then, I think that there were a few problems in some versions of Netscape/Mozilla, but I don't remember them being nearly as serious as the IE holes.
  • Re:Does this mean (Score:3, Informative)

    by gunpowder ( 614638 ) on Tuesday February 03, 2004 @01:23AM (#8166704)
    1. I responded to a post that claimed that according to RFC 1738 the user:pass@host scheme is allowed in combination with http://-URLs. The RFC 1738 doen't allow the use of user:pass@host.

    2. You say that RFC 2396 supercedes RFC 1738, but you fail to mention whether this RFC is considered mandatory or not.

    3. Even though RFC 2396 supercedes RFC 1738, it still doesn't allow the user:pass@host scheme for http://-URLs. Excerpt from RFC 2396:
    Some URL schemes use the format "user:password" in the userinfo field. This practice is NOT RECOMMENDED, because the passing of authentication information in clear text (such as URI) has proven to be a security risk in almost every case where it has been used.

    The "some URL schemes" are those defined in RFC 1738 (since there are no definitions of specific URL schemes in this RFC 2396). So user:pass@host is STILL NOT ALLOWED or even mandatory by RFC 2396.
  • Re:the needed patch (Score:3, Informative)

    by bonch ( 38532 ) on Tuesday February 03, 2004 @01:41AM (#8166782)
    Me, for example - I tend to struggle with Microsoft's 'You Must Double-Click A Lot To Get Your File Structure Sorted' hierarchy, and all those damn toolbars just eat space on my not-so-high resolution screen. To each their own, I suppose.

    So set Explorer to single-click folders, and remove toolbars or size their graphics to Small.
  • WUAUCLT.EXE changed (Score:2, Informative)

    by cocentaina ( 454127 ) on Tuesday February 03, 2004 @05:15AM (#8167416)
    My firewall (Kerio PF, also checks MD5 hashes of executables) detected a change in the Windows Update Client itself while applying this patch. The date on the executable is 1/31/2004. Is there something I should worry about, cuz I don't think this has happened before?
  • by Anonymous Coward on Tuesday February 03, 2004 @07:18AM (#8167695)
    Outdated RFC. Try RFC 2396.

    Go read then post.
  • Re:To be fair... (Score:1, Informative)

    by Anonymous Coward on Tuesday February 03, 2004 @07:51AM (#8167766)
    Bullshit. If anything happens to IE you kill it with task manager. That's if your using an operating system that is less than 6 years old.
    You still use Redhat 5 as well I guess?

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...