Closed GoogleCodeExporter closed 9 years ago
Original comment by fors...@google.com
on 27 Oct 2014 at 9:05
Original comment by fors...@google.com
on 28 Nov 2014 at 9:23
Original comment by fors...@google.com
on 2 Dec 2014 at 11:11
Correspondance Date: 29 Oct 2014
< Microsoft say they are investigating.
Original comment by fors...@google.com
on 13 Jan 2015 at 12:40
A bit more detail on the potential exploitability of this issue. The most
obvious exploitation method is for information disclosure. If you could
convince a user to browse to a HTML page on a malicious SMB server in IE it's
possible to use MSXML XMLHttpRequest to read any local file (with respect to
the security settings of the browser such as the sandboxing mode). This can be
achieved by requesting a file from the server from the current directory and
redirecting the request to a local file.
It could also be exploited to write files to disk if the user could be
convinced to open a document or other file on the malicious server which then
writes to the current location. For example Word will write out temporary files
to the current location for recovery purposes, this could be hijacked to write
the temporary file to anywhere the user has permissions to write (and as it can
know the username due to the SMB auth it can guess their user's directory).
While the malicious server couldn't directly specify the contents of the file
it might be able to do so indirectly (for example the temporary file example).
Original comment by fors...@google.com
on 13 Jan 2015 at 12:54
[deleted comment]
Correspondance Date: 16 Jan 2015
< Microsoft have concluded that the issue does not meet the bar of a security
bulletin. They state that it would require too much control from the part of
the attacker and they do not consider group policy settings as a security
feature.
Marking as WontFix and removing view restriction as the MSRC case is closed.
Original comment by fors...@google.com
on 16 Jan 2015 at 7:55
Original issue reported on code.google.com by
fors...@google.com
on 27 Oct 2014 at 4:56Attachments: