funsec mailing list archives

Re: Desktop search: A new attack vector for malware?


From: Jordan Wiens <numatrix () ufl edu>
Date: Wed, 13 Jun 2007 10:39:44 -0400

Don't know about the idea of the engine itself as directly vulnerable, but there's a number of similar issues it presents.

First, any cross-site scripting vulnerability in google.com can be combined to attack someone with google desktop installed:
        http://download.watchfire.com/whitepapers/Overtaking-Google-Desktop.pdf
(incidentally, Jesse Ruderman first pointed this out three years ago)
http://www.squarefree.com/2004/10/22/my-impressions-of-google- desktop-search/

I don't remember the exact details of the fix offhand, but I think there was some discussion that it might still be worked around, though I could be wrong. This particular avenue for attack was due to the fact that google desktop would trust results coming back from google.com.

Second, any vulnerability in the OS or parsing libraries used by the drive indexing service might be leveraged indirectly as was the case with the WMF vuln:

http://www.f-secure.com/weblog/archives/archive-122005.html#00000753

Third, there's always the auto-update vector that applies more broadly to many other programs too, but Google Desktop is specifically vulnerable to:

http://ha.ckers.org/blog/20070531/google-desktop-0day/

The first and third directly apply to google desktop and may or may not apply to other tools, the second issue is very similar to the scenario you present, just with a utilized library or call instead of the engine itself.

--
Jordan Wiens, CISSP
UF Network Security Engineer
(352)392-2061

On Jun 13, 2007, at 9:04 AM, Richard M. Smith wrote:

Hi,

Has any company looked into the issue of desktop search programs being an attack vector for malware? I'm wondering if a booby-trapped document file can be placed on a system that will cause a buffer error in a desktop search bot. The buffer overflow can then be used to install and run malware. Such
a file can be delivered as an attached file to an email message or
downloaded on the sly to a browser cache.

Also can a desktop search bot be DoSed by having it index an exploding .ZIP which is modest in size but contains many terrabytes of document files?

Richard

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.



_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: