SECURE TARGET (Security Advisory October 17, 2004)
Topic: Microsoft Windows Huge Text Processing Instability
Discovery Date: October 14, 2004
External Links: VULDB, Full-Disclosure, BugTraq, SICHERHEITSLüCKEN, Addict3d, Ls, Der Keiler, Seifried, NetSys, Mail Archive, SecLists, Neohapsis, Checksum, Network Security, Virus, DoddsNet, ReadList, Mega Security, Security Trap, Virovvch, DevArchives
Affected applications and platforms:
Notepad, NotePad2 and MetaPad (Seems like all Text Processing Apps) / Microsoft Windows (All Versions)
It is not important, the limitation of opening large text file with “notepad” or similar products like NotePad2 (http://www.flos-freeware.ch) and MetaPad (http://liquidninja.com/metapad/); the point is just the way these tiny text processing apps open and handle large text files (talking about over the 200MB).
The way they handle huge text files, it is near possible for a fast modern PC to be completely unstable. This Instability may path to process injection because you cannot even kill the processes of these apps and they will remain “up and running” even when you logged off. So, it’s possible for a unprivileged user to simply hook to the remaining process of a privilege user and this lead to information disclosure (simply reading the content of the memory before swapping a large file which happens time after time, based on the file size) but may even lead to running privileged tasks based on the app they used for processing text.
It is different to exploit based on the application you choose for text processing; for windows default notepad.exe, it’ll be some like a huge DoS but for NotePad2.exe and MetaPad.exe it is possible to doing process injection (information disclosure and/or running privileged tasks).
The best way to work around this situation is just not to open large text files in windows! or wait a long time for completion of task.
Microsoft Windows XP SP1/SP2RC2/SP2 on Intel P4 2.4 with 1GB of RAM
Kaveh Mofidi [ Admin (at) SecureTarget [dot] net ]
Head of Secure Target Network