Novell Client login form enables reading and writing from and to the clipboard of the logged-in user. Affected are Novell Client for Windows, versions 4.9 and 4.8 (On windows XP Pro and Windows 2000 Workstation).
61f905696e930702d7204613b969a5b10af30267e2f8d60c9f31b1d584f95c76
Suggested Risk Level: Low.
Type of Risk: Information Leakage, Information Injection, Unauthorized
Access.
Affected Software: Novell Client for Windows, versions 4.9 and 4.8 (On
windows XP Pro and Windows 2000 Workstation).
This versions are the only one tested, thus other version may be vulnerable
as well.
Local / Remote activation: Local.
Summary:
1. Anyone with access to the computer's local operating system console, one
using the Novell client login screen (when the console is locked), can view
a textual content of the clipboard of the locally logged in user, by
performing a paste command into the "user name" field of the login form.
2. Anyone with access to the computer's local operating system console, one
using the Novell client login screen (when the console is locked), can
inject its own textual content into the clipboard of the currently logged-in
user by adding, temporally, a text string into the "user name" field of the
login form, and then copy it into the clipboard.
This can also be done if no user is yet logged-in to the computer (after
booting the computer or after a user logged off).
The text will remain in the clipboard after a user logged in, and if the
user will perform a paste command the content will be injected into the
user's console session.
Summary Notes:
1. One must remember that access to the console may be achieved not only by
a local presence of the attacker but also via a remote control application,
if one is installed on the computer.
2. I assume non-textual content is accessible as well, but due to the nature
of the relevant field in the login form only textual content can be pasted
into it.
Possible Abuses:
1. A local attacker can read the last textual information added to the
clipboard by the logged in user, without a need to authenticate.
2.
A. A local attacker can damage the logged in user's data if a careless user
will paste the attacker's text into any application, and the user will not
review it before using it.
B. A local attacker can damage the logged in user's operating system or
applications if a careless user will paste the attacker's text as a command,
and the user will not review it before executing it.
Reproduction:
1. Clipboard read:
a. Log in to the operating system.
b. Open any text editor (or any textual field in the operating system or
application), and write a unique text.
c. Copy the text you just wrote (select it and press ctrl+c).
d. Lock the console by pressing ctrl+alt+del and clicking on the "lock
computer" button.
e. Press ctrl+alt+del to open the Novell login form.
f. Click in the "user name" field and if there is a text inside, delete it
or select all of it.
g. Press ctrl+v, and the text you copied before will appear in "user name"
field.
1. Clipboard write:
a. Log in to the operating system.
b. Lock the console by pressing ctrl+alt+del and clicking on the "lock
computer" button.
c. Press ctrl+alt+del to open the Novell login form.
d. Click in the "user name" field and if there is a text inside, delete it
or select all of it.
e. Write a unique text.
f. Copy the text you just wrote (select it and press ctrl+c).
g. Delete this unique text.
h. Perform a regular log in to the operating system.
i. Open any text editor (or any textual field in the operating system or
application), and press ctrl+v, and the text you copied before will appear.
Steps "a" and "b" can be replaced by booting or restarting the operating
system and once the graphical interface has been displayed, proceed to step
c.
Exploit Code: No need.
Direct resolution: None at the time this advisory was published.
Workarounds:
WARNING: The following listed applications are not made by me and I have no
knowledge if they will perform as expected and if they will not damage your
hardware and/or software. Using this applications is totally at your own
risk and responsibility.
I only mention this applications in this advisory as possible workarounds to
overcome the vulnerability mentioned in this advisory.
Following are some freeware applications intended to clear the clipboard.
Some of the applications can be activated manually (before locking or
leaving the desktop) and/or some of the applications can be initiated via a
command line, which makes them suitable to be scheduled by the windows tasks
scheduler to run every X minutes/hours or run while the operating system is
idle.
AutoClipClear
https://www.geocities.com/visualfantasy_studio/acc.htm
It has no interface nor settings to adjust. Can be run in via a command
line.
NirCmd
https://www.nirsoft.net/utils/nircmd.html
It has only textual interface but many extra functions (one of them is
locking the console, so one can make a batch file to clear the clipboard and
then lock the console). Can be run in via a command line.
ClipClear
https://www.moonsoftware.com/freeware.asp#clipclear
It has a task bar icon and clicking it clears the clipboard. I guess it will
not be suitable to run as a scheduled task since activating it only makes it
available at the task bar. It has no startup switches.
I tried to find a scheduler that can run an application at the event when
the workstation is being locked, but found only this two:
1. Funny, but someone asked just that at Novell's site and he was answered
that this can be done with NALRUN32 and NALRUNW from Novell's "Workstation
Manager" ("ZEN 2 Application Management Tool Kit"), but without a proper
example.
https://www.novell.com/coolsolutions/qna/4332.html
https://www.novell.com/coolsolutions/zenworks/features/a_zen2_toolkit_zw.html
#nalrun
2. The task scheduler of windows vista will be able to do this (when windows
vista will be officially released...).
https://www.microsoft.com/technet/windowsvista/mgmntops/taskschd.mspx
Vendor Notification: Novell was notified of this issue more than two months
ago.
Due to my feeling that the company was not acting to solve this issue, I
notified them after one month, that I will wait another month, and if at
that time the company will not publish an advisory and/or a patch I will
publish my own advisory.
Since the company did not publicly acted regarding this vulnerability within
this time frame, which I think is reasonable this advisory is now
published.
Novell's lack of action may be due to the low risk nature of this
vulnerability.
Credit:
Eitan Caspi
Israel
Email: eitancaspi@yahoo.com
Past security advisories:
1.
https://online.securityfocus.com/bid/4053
https://www.microsoft.com/technet/security/bulletin/MS02-003.mspx
https://support.microsoft.com/default.aspx?scid=KB;en-us;315085&
2.
https://online.securityfocus.com/bid/5972
https://support.microsoft.com/default.aspx?scid=kb;en-us;Q329350
3.
https://online.securityfocus.com/bid/6280
https://www.securityfocus.com/archive/1/301624
4.
https://online.securityfocus.com/bid/6736
https://online.securityfocus.com/archive/1/309442
5.
https://www.securityfocus.com/bid/7046
https://www.securityfocus.com/archive/1/314361
6.
https://www.securityfocus.com/archive/1/393800
https://service1.symantec.com/SUPPORT/ent-security.nsf/3d2a1f71c5a00334852568
0f006426be/c937e09a6ad4e20688256a22002724bb?OpenDocument
Articles:
You can find some articles I have written at
https://www.themarker.com/eng/archive/one.jhtml
(filter: Author = Eitan Caspi (second name set), From year = 2000 , Until
year = 2002)
Eitan Caspi
Israel
Professional Blog (Hebrew): https://www.notes.co.il/eitan
Personal Blog (Hebrew): https://blog.tapuz.co.il/eitancaspi
Blog (English): https://eitancaspi.blogspot.com
"Technology is like sex. No Hands On - No Fun." (Eitan Caspi)