A big “d’oh,” maybe

It seems like only last week that I was whining that browsers were disintegrating like so many smashed plates at a Greek wedding. Oh yes, it was only last week.

Well it looks as if some of this may not be a unique personal experience but is caused by a vulnerability in IE. Microsoft’s Security Advisory describes the flaw they’ve just found. The way it seems to operate sounds uncannily like what’s happened to my browser in IE.

The vulnerability exists as an invalid pointer reference in the data binding function of Internet Explorer. When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object’s memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable. (from Microsoft’s Technet)

“invalid pointer reference in the data binding function.” I understand all the words individually but I got lost as soon as I tried to understand them when they are linked together.

But, causing IE to “exit unexpectedly”. That sounds like what IE has been doing randomly for weeks. Often failing to release the memory that it was using – which I don’t find out until too late. I didn’t really consider that it might be a new form of browser attack. How naive is that? D’oh.

Not that’s any excuse for Firefox. But I’m not convinced that FF is so magically free from being affected by the same attack attempts, that it won’t crash and die when it bumps into them, even if it doesn’t let an intruder in. In any case, I only ever use IE when Firefox has decided to commit suicide a few times.

I know that using Linux would mean that attacks like this would never work but it’s not completely intrusion-proof. This PC is pretty well on its last legs, as it is. It’s a few more bad reads away from hard disk failure, anyway. (And that’s in the not-completely “legacy” disk drive, not the really old disks that are also still in it.) The graphics card should be in the “Museum of graphics cards that were state of the art in 2003” If I change its OS, my software won’t work, I’ll lose all my passwords, the cable connections will have to be reset and so on. When I’m forced to get a new PC, it will use Linux, but until then, no.

Microsoft Technet page warns site owners that SQL injection attacks might turn their sites into unwitting distributors for the malcode and directs worried site owners to a scrawlr, a free HP tool that is supposed to check your site for SQL injection code. Every site that uses something like php is fair game for that.

So it sounds like a plan and the scrawlr page has a good cartoon. But I end up far from convinced there’s any value in downloading scrawlr, after reading the comments. Like this one from leon:

The comic is xkcd
The tool is useless, scrawl is entirely unable to detect even the simplest vulnerabilities, i went as far as pasting an example injection into the url bar and it okayed that!!! I also have an intentionally vulnerable site with local only access that we are using to configure our new IDS and it didn’t find a thing… seriously, if you take anything away from this, let it be the comic.

(That link is to the comic, in general. The scrawlr page has the relevant cartoon.)
MarkH says:

Doesnt’ support POST forms or Javascript. In other words, this demo tool can’t actually test anything that any web developer would have written since, oh, say 2001.
Epic fail.

Doesn’t let you check POST forms? 🙂 I think I’ll pass, then.

A report on the BBC’s tech page had a “security expert” saying “don’t use IE ” and Microsoft – unsurprisingly – warning against that particular course of action. 🙂

As many as 10,000 websites have been compromised since the vulnerability was discovered, he said.
“What we’ve seen from the exploit so far is it stealing game passwords, but it’s inevitable that it will be adapted by criminals,” he said. “It’s just a question of modifying the payload the trojan installs.” (from the BBC)

As soon as “security experts” start talking up threats, I tend not to believe them. 10,000 websites sounds as unconvincing as the UK government’s “30 terror plots.” And so far the exploit has stolen game passwords. Hmm. Hardly a cause to panic about your e-bay sales or your online banking, then. Do you care if you find yourself playing World of Warcraft alongside an unaccredited troll?

Still, Microsoft’s idea of advice doesn’t inspire much confidence, either.

Microsoft urged people to be vigilant while it investigated and prepared an emergency patch to resolve it.

How exactly am I supposed to be vigilant? I could try to check every invalid pointer reference in the data binding function, could I? Even if this wasn’t so far over my head that I could call it an “umbrella”, IE would have to become Open Source before I could even hope to identify the databinding function.

I thought I’d already pushed the intrusion detection boat out by running Ethereal and Snort whenever I feel mildly obsessive. (And they piss me off because half the transactions that my computer indulges in can’t be fathomed anyway. So I stick to using them for purposes like getting my passwords off the traffic stream, in plain text, which is surprisingly helpful when I’ve forgotten them but annoys me all the same Why on earth have passwords that are hidden from the bloody user by asterisks but easily readable by anyone with a packet-sniffer? Cue another rant.)

This “data-binding function” of IE needs a whole new set of skills that I really don’t believe would hold much entertainment value. So I don’t intend to get them. And “invalid pointers”? Can Microsoft or someone direct me to the Girl’s Big Book of Valid Pointers so I can be properly “vigilant”?

Firefox and Gmail

FirefoxAre there any other Firefox users who have Gmail (Google Mail) accounts? If so, please put me out of my misery. Does your copy of firefox crash every single time you try and do something with your mailbox?

I am using Firefox 2.0.0.14, which as far as I can tell is the most up to date version. I have tried updating it and I have tried updating various other components on my computer. All to no avail.

Without fail, every time I go into Gmail the countdown to a crash begins. I can view all manner of other pages, have twenty tabs open and be downloading huge files. All fine. Try to click on a folder in Gmail and it is game over. I have sort of narrowed it down to something in the scripts on Gmail causing the crash but I am not totally sure (yet).

Recent examples: I tried to create a new filter… crash. I tried to view all starred mail… crash. I tried to view all emails with a given tag… crash. I tried to send an email… crash.

The only saving grace is I can read emails and, despite FF crashing on me it actually manages to send the emails. It is, in a nutshell, a nightmare. Fortunately Internet Explorer is perfectly functional with Gmail, but this makes it all the more annoying. During a given day, I wouldn’t have any reason to open IE if it wasn’t for bloody Gmail.

As far as I can tell, this is recent. I cant remember when it began but it must be less than a month ago.

Is it just my computer? Am I alone with this madness? Do Firefox developers get to see the 30 – 40 error messages my machine sends out each day?

Is your PC infected or hacked?

Interestingly, I have been looking through the visitor logs for this site today and have discovered some interesting things. Lot of people who visit this blog have a User Agent (UA) string which identifies a bit of spyware or possible hack attack.

Two of the most common strings are:

SIMBAR – this appears to be involved in a “Team Evil” hack, while it is not clear to me what adds the SIMBAR to the string, it has also been discussed on TaoSecurity. The most recent visitor with this UA string was from London and the string read:

Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1;SIMBAR Enabled; SIMBAR={0611EF31-5377-41a3-A9BB-228547113477};SIMBAR=0; .NET CLR 1.1.4322)

HOTBAR – there are quite a few hits from this “semi-non-consensual” browser add on, and I have no idea if it is bad software or not (Wiki has a debate on it if you are interested). The most recent visitors we have had was an NTL broadband user (connected via Harrogate area) with the following UA string:

Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; V1; Hotbar 4.5.1.0)

It is not really surprising this are IE based strings showing signs of oddness, and over the last few months there have been lots of hits from this two UAs, as well as other “suspicious” strings. I will pay more attention in future and see if there are any patterns to be discerned.

In a nutshell though, I would strongly suggest everyone gets a good anti-virus package (AVG is free) and some reliable anti-spyware packages.

[tags]Spyware, browsers, technology, websites, statistics[/tags]