Sabtu, 17 November 2012

0 DNS poisoning via Port Exhaustion

Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.
It discloses two vulnerabilities:
  1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.
  2. A vulnerability in multiuser Windows environments which enables local DNS cache poisoning of arbitrary domains. This  vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more.
The whitepaper can be found here.
A few video demos of our Proof-of-Concept:
  1. Attack: Remote DNS poisoning via Java Applets: Cookie theft.
    Environment: Ubuntu 11.04, Firefox 7.0.1. Movie link  
  2. Attack: Remote DNS poisoning via Java Apples: NTLM credentials and Clipboard theft.
    Environment: Windows 2008, Internet Explorer 9.  Movie link
  3. Attack: Remote DNS poisoning via Java Applets: Firewall bypass.
    Environment: Windows 2008, Firefox 7.0.1. Movie Link
  4. Attack: Local DNS poisoning via port exhaustion. Movie link
    Environment: Windows 2008. 
We would like to thank Oracle and Microsoft for their cooperation.
-Roee Hay and Yair Amit

0 komentar:

Posting Komentar

 

Cracker Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates