The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

This document is intended to provide a summary of current intelligence and best practices to ensure the highest level of protection from your McAfee security solution.

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2016-06-21 00:48:03

McAfee Labs Threat Advisory - Intel Security

This document is intended to provide a summary of current intelligence and best practices to ensure the highest level of protection from your McAfee security solution.

McAfee Labs Threat Advisory
Exploit-CVE2011-2140

February 24, 2012

Summary
Exploit-CVE2011-2140 is the detection for malicious swf files which infiltrate a victim’s computer by
exploiting a flash player vulnerability to download the malicious payloads from a remote server. This
vulnerability could cause a crash and potentially allow an attacker to take control of the affected
system.
Detailed information about the exploit, its propagation, and mitigation are in the following sections:

• Infection and Propagation Vectors
• Characteristics and Symptoms
• Getting Help from the McAfee Foundstone Services team

Infection and Propagation Vectors
The infection may occur when users visit the compromised website which is hosted with malicious
JavaScript. The link of the compromised websites may arrive via email as part of spam campaign,
compromised out bound links on a website and by injecting the malicious URL trough iframes etc.

Mitigation

Users are requested to exercise caution while opening unsolicited emails and unknown links. Users are
advised to update Windows and third-party application security patches and virus definitions on a
regular basis and have proper firewall filtering rules.

Characteristics and Symptoms

Description:

The pictorial illustration below [Figure 1] gives an overview and flow of this attack.

Figure 1 : Overview and Flow

The compromised web server is hosted with malicious JavaScript [Figure 2], which identifies the flash
player version and redirects the user to execute the malicious swf file.

Figure 2: Malicious Javascript

The attacker uses open source JavaScript code [Figure 3] to identify if a flash player is installed on the
machine as shown below:

Figure 3: Detecting flash player’s presence

Upon identifying the vulnerable version, the control is transferred to execute the malicious swf file by
using the following parameters [Figure 4].

Figure 4: Parameters

The malicious swf has DOABC tag which contains the Action Script commands [Figure 5] that are used
by the exploit to load another swf file and to spray the shellcode in to memory.

Figure 5: Action Script -1

The loaded swf payload plays a movie file named “e.avi” [Figure 6], which attempts to exploit the flash
player vulnerability. On successful exploitation, the remote attacker could gain the control to execute
the arbitrary code.

Figure 6: Action Script -2

Upon execution of the main .swf file, it crashes the Internet explorer in the flash player module
“flash10u.ocx” as shown below in Figure-7.

Figure 7: Crash of Internet explorer

The investigation of crash further reveals that the flaw exists in the flash player, which allows the
attacker to overwrite the stack [Figure 8] and control the EIP that leads to the execution of the shell
code. The below mentioned figure shows that the stack is overwritten by the address 0x0D0D0D0D.

Figure 8: Stack Overwrite

The control [Figure 9] is transferred to the address 0x0D0D0D0D using LEAVE and RETN instruction,
which is already occupied by the shellcode that is now ready for execution.

Figure 9: Control & Transfer

Then it decrypts [Figure 10] the URL and covertly downloads the malicious payload from the remote
server on to the victims’ machine.

Figure 10: Decryption of URL

The malicious URL in the shellcode is clearly visible as shown in the below figure-11.

Figure 11: Shellcode

The Network connections that were observed includes :

• tongjiaaexe.3322.org
• meorm.com
• news.zztlgg.com
Mitigation
• Block access to the domains listed above.
• Use a browser plug-in to block execution of scripts and iframes.
• Keep up-to-date Antivirus signatures
• Keep software up-to-date with the latest available patches

Getting Help from the McAfee Foundstone Services team
This document is intended to provide a summary of current intelligence and best practices to ensure
the highest level of protection from your McAfee security solution. The McAfee Foundstone Services
team offers a full range of strategic and technical consulting services that can further help to ensure
you identify security risk and build effective solutions to remediate security vulnerabilities. You can
reach them here: https://secure.mcafee.com/apps/services/services-contact.aspx

© 2011 McAfee, Inc. All rights reserved.


Click to View FlipBook Version