博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
WinRAR v3.80 - ZIP Filename Spoofing
阅读量:2435 次
发布时间:2019-05-10

本文共 5959 字,大约阅读时间需要 19 分钟。

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1  

+------------------------------------------------------------------------+|                                 .......                                ||                         ..''xxxxxxxxxxxxxxx'...                        ||                    ..'xxxxxxxxxxxxxxxxxxxxxxxxxxx..                    ||                 ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'.                 ||               .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'.               ||             .'xxxxxxxxxxxxxxxxxxxxx''......        ...  ..             ||            .xxxxxxxxxxxxxxxxxx'...         ........      .'.           ||           'xxxxxxxxxxxxxxx'......                          '.          ||          'xxxxxxxxxxxxxx'..'x..                            .x.         ||         .xxxxxxxxxxxx'...'..                  ...           .'         ||         'xxxxxxxxx'..  .                          ..        .x.        ||         xxxxxxx'.                                  ..        x.        ||         xxxx'.                ....                  x        x.        ||         'x'.            ...'xxxxxxx'.               x       .x.        ||         .x'.         .'xxxxxxxxxxxxxx.             ''       .'         ||          .xx.      .'xxxxxxxxxxxxxxxx.           .'xx'''.  .'          ||           .xx..    'xxxxxxxxxxxxxxxx'          .'xxxxxxxxx''.          ||            .'xx'.  .'xxxxxxxxxxxxxxx.      ..'xxxxxxxxxxxx'            ||              .xxx'.  .xxxxxxxxxxxx'.    .'xxxxxxxxxxxxxx'.             ||                .xxxx'.'xxxxxxxxx'.      xxx'xxxxxxxxxx'.               ||                  .'xxxxxxx'....          ...xxxxxxx'.                  ||                     ..'xxxxx'..         ..xxxxx'..                     ||                          ....'xx'.....''''...                          ||                                                                        ||                    CubilFelino Security Research Lab                   ||                            proudly presents...                         |+------------------------------------------------------------------------+=======================================================

Security Advisory: WinRAR v3.80 - ZIP Filename Spoofing


Security Researcher Info:


Discovered by:        Christian Navarrete (chr1x) - M�xicoWebsite URL:        Contact E-mail:        chr1x_at_sectester. netOpenPGP key id:     0x3765F4F8

OpenPGP fingerprint: 58AB CB8C DCF4 8B2E 40EF 11E8 4354 91DF 3765 F4F8

Vulnerability General Information:


Discovery date:        30/08/2009 (Good gift of Birthday! :)Advisory URL:

Vulnerability on Video: PoC/Exploit Availability:

Software:         WinRARVersion:            3.80Security risk:        LowExploitable from:         LocalVulnerability:        ZIP Filename spoofingRelease mode:         Coordinated disclosure.Vendor:            Status:            Current version (WinRAR v3.80) not patched, next

engine version (WinRAR v.3.90) will be patched CWE Weakness ID: CWE-372: Incomplete Internal State Distinction (1.5) CVE ID: None provided

Disclosure Policy:

Product Description:


(Taken from Wikipedia)

WinRAR is a shareware file archiver and data compression utility developed by Eugene Roshal, and first released around 1995. It is one of the few applications that is

able to create RAR archives natively, because the encoding method is held to be proprietary.

WinRAR supports the following features:

  • Complete support for RAR and ZIP archives, and unpacking of ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, EXE, 7z, and Z archives. Future versions of WinRAR are

planned to include 7z creation.

* The ability to create self-extracting and multi-volume (split) archives.
* Data redundancy is provided via recovery records and recovery volumes, allowing reconstruction of damaged archives. * Support for advanced NTFS file system options and Unicode in file names.
* Optional archive encryption using AES (Advanced Encryption Standard) with a 128-bit key.

I. Vulnerability Summary:


WinRAR v3.80 is prone to a Filename Spoofing contained inside a malformed .ZIP file.

II. Vulnerability Description:


ZIP File Spoofing can be done by to a mismatch of file name in the file list in WinRAR GUI shell and in extracted file. A real exploitation of this issue is in the following scenario: When a user opens the malformed file using WinRAR v3.80 will see filename (example: imagefile.gif) but when files are extracted, the extracted file could be another one, not the original imagefile.gif. There are two parts of code looking for the start of ZIP central directory. One in extraction routine and other in file list browsing. they used slightly different approaches, so one of the first filename record found and another for the "hidden" file. They must be exactly the same and both find the same file names.

ZIP format contains two copies of file name, one in local file header and another in central directory, for redundancy purpose. If file names mismatch, it must not be a reason to abort extraction, because it would defeat the entire purpose of having two file name copies. It is up to unzip implementation to choose a name, but typically, if can't detect which of records is more valid, the central directory record has precedence over local file header, because it contains more information about a file.

III. Potential Attack Vector:


An attacker can use this vulnerability in order to hide malware and perform social engineering attacks to perform a successfull Internet user targeting attack.

IV. Risk Assessment:


Likelihood of exploitation:Low

* Since the user should interact a little bit with this, obviously attack vectors are here, but differs on the context and many things in order to get it done.

Impact: Low

* Since if a user receive this (doesn't matter the way) when he/she open the file can see a filename thats isn't the one that can be extracted.

Overall risk: Low

V. Researcher & Vendor Communication for Disclosure timeline

转载地址:http://egmmb.baihongyu.com/

你可能感兴趣的文章
南阳铁通推出宽带“网吧式”服务(转)
查看>>
共享池 shared pool
查看>>
一张图搞定Java面向对象
查看>>
DOORS需求管理工具的其他资料
查看>>
使用 Rational RequisitePro 进行需求管理的新技术
查看>>
最新解决方案助力Borland ALM亚太应用
查看>>
Borland ALM之需求定义和管理解决方案
查看>>
需求管理详解
查看>>
Verizon选择Borland控制开发流程并降低风险
查看>>
Borland 崭新的Caliber Define IT产品
查看>>
IBM Rational RequisitePro集成简介
查看>>
EDS用Borland作为它的全球标准
查看>>
CMMI模型与Rational软件相结合
查看>>
集成 IBM Rational RequisitePro 与 IBM Rational Portfolio Manager
查看>>
OOAD利器Rational Rose的介绍
查看>>
SCA客户端以及基于Java的模型实现(一)
查看>>
后CMMI时代的软件过程改进
查看>>
SCA及未来软件系统的开发
查看>>
CaliberRM 需求管理系统
查看>>
需求管理工具试用 – CaliberRM
查看>>