<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>New Shell Extension CLSID Black List</title>
                            <pubDate>Fri, 14 Apr 2006 01:57:24 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/270/New_Shell_Extension_CLSID_Black_List</link>
                                        <author>randori82 &lt;email-suppressed@example.com&gt;</author>
                                                    <description>There's a new reg key to black list CLSIDs for Shell Extensions from the latest MS patch set(MS06-015).&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Here's a bit of detail on the keys for Shell Extensions (&lt;a href=&quot;http://support.microsoft.com/kb/216384/EN-US/&quot;&gt;http://support.microsoft.com/kb/216384/EN-US/&lt;/a&gt;):&lt;br /&gt;
HKLM:Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved is the CLSID list of Shell Extensions that are approved to run.&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
This is compared against when 'EnforceShellExtensionSecurity' is set to 1 in HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.&amp;nbsp;&amp;nbsp;Nothing new there, that's existing functionality.&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
However, with MS06-015, there's a new key: HKLM:Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Blocked that also gets referenced from ShouldLoadShellExt.&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The *blocked list* is checked before the *allowed list*, so anything that is blocked will not run, whether or not it's in the *allowed list*.&lt;br /&gt;
&lt;br /&gt;
So, following MS06-015, you can make sure hosts will not run Shell Extensions by adding their CLSID to the *blocked list*.&lt;br /&gt;
&lt;br /&gt;
Obviously this couldn't be put in the workaround for this patch, but for future Shell Extension vulnerabilities, this is definatley a workaround.&lt;br /&gt;
&lt;br /&gt;
This new key was found while reversing MS06-015 for XP.&lt;br /&gt;
&lt;br /&gt;
~Andre Protas</description>
                    </item>
                <item>
            <title>script contribution</title>
                            <pubDate>Mon, 27 Mar 2006 02:45:53 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/258/script_contribution</link>
                                        <author>randori82 &lt;email-suppressed@example.com&gt;</author>
                                                    <description>just a simple timesaver, but pysym.py will auto-load (once re-supported by idapython) symbols/debug from ms's symbol servers.&lt;br /&gt;
&lt;a href=&quot;https://www.openrce.org/repositories/browse/randori82&quot;&gt;https://www.openrce.org/repositories/browse/randori82&lt;/a&gt;</description>
                    </item>
                <item>
            <title>blackhat europe slides</title>
                            <pubDate>Wed, 22 Mar 2006 17:40:17 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/254/blackhat_europe_slides</link>
                                        <author>randori82 &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Thanks for coming (those of you that did) to the presentation.&amp;nbsp;&amp;nbsp;The little feedback that we have heard was quite positive.&lt;br /&gt;
&lt;br /&gt;
For those of you interested, here are the slides:&lt;br /&gt;
&lt;a href=&quot;http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Manzuik.pdf&quot;&gt;http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Manzuik.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The free diffing tool should be available soon, as it's undergoing some batch mode analysis for qa testing.</description>
                    </item>
            </channel>
</rss>
