180solutions Zango "所需的Adware组件" 任意代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195026 漏洞类型 未知
发布时间 2006-05-11 更新时间 2006-05-11
CVE编号 CVE-2006-2324 CNNVD-ID CNNVD-200605-224
漏洞平台 N/A CVSS评分 10.0
|漏洞来源
https://www.securityfocus.com/bid/83920
https://cxsecurity.com/issue/WLB-2006050087
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200605-224
|漏洞详情
180solutionsZango会下载"所需的Adware组件"而不检查认证的完整性,可以使与上下文有关的攻击者通过破坏static.zangocash.com的DNS解析来执行任意代码。
|漏洞EXP
_______________________________________________________________________

Zango Adware -  Insecure Auto-Update and File execution
_______________________________________________________________________

Reference : TZO-042006-Zango
Author    : Thierry Zoller
Advisory  : http://secdev.zoller.lu/research/zango.htm

Shameless Plug :
I would  like to take the opportunity to invite you to the
Security Conference known as "Hack.lu 2006" in the Grand-Duchy
of Luxembourg. More information at http://www.hack.lu
** See you there :)

I. Background
~~~~~~~~~~~~~

http://www.zangocash.com

"ZangoCash (formerly LOUDcash) is recognized around the world as one of
the best pay-per-install affiliate programs on the Internet. ZangoCash
is a subsidiary of 180solutions which also includes Zango and 
MetricsDirect . Every day, 7,500-10,000 ZangoCash affiliates distribute
our software to users who are then connected with more than 6,000 
MetricsDirect advertisers."

II. Description
~~~~~~~~~~~~~~~

After the acknowledgement of an License Agreement, during Startup, the 
bundled EXE contacts several servers and downloads the required Adware
components. The downloaded components are not checked for integrity 
or authenticity and are executed as soon as they are downloaded.

The following procedures are exploitable :

1. Initial Install
   2. Auto-Update function

The condition is exploitable in the following scenarios (maybe you
know more?) :

1. You have legitimate control over the DNS server
   2. You have compromised a DNS server
   3. You forge a cache poisoning attack against a vulnerable DNS server
   4. You have access to the machine and change the HOST file

Redirecting the hostname "static.zangocash.com" to an IP address under
your Control and creating the respective V-host allows you to install
any type of executable on the machine where zango is being installed
or currently is installed, in other words: You could potentially
compromise an internal network of a company if Zango is installed
on workstations (or servers - i've seen that) and one of the 4
aforementioned conditions are met.

See http://secdev.zoller.lu/research/zango.htm for more information

Why is this an Issue ?
~~~~~~~~~~~~~~~~~~~~~~
Especially the auto update function is a problem, imagine a DNS server 
not a split setup) is compromised or cache-poisened, every workstation 
with zango installed inside the company can be immediately compromised
as the Workstation tries to automaticaly download an update of Zango 
and fails to realise that instead of Zango it downloads and executes 
a Rootkit/Backdoor/"put anything here".

III. Summary
~~~~~~~~~~~~~~~
Vendor contact : 01/02/2006
Vendor Response : 05/02/2006

Vendor Response :
No official statement, first I was asked to remove the webpage,
then I was allowed to keep it online, I was not given permission
to disclose the conversations that took place. I will respect
the rights of 0180 Solutions.

Reference : TZO-042006-Zango
Author    : Thierry Zoller 
WWW       : http://secdev.zoller.lu
|受影响的产品
180Solutions Zango 0
|参考资料

来源:BUGTRAQ
名称:20060509[TZO-042006]InsecureAuto-UpdateandFileexecution
链接:http://www.securityfocus.com/archive/1/archive/1/433566/100/0/threaded
来源:MISC
链接:http://secdev.zoller.lu/research/zango.htm
来源:SREASON
名称:890
链接:http://securityreason.com/securityalert/890