Thanks for getting back with me Thomas.  I know that we can't block ms-msdt
because that's downloaded by Word after opening the file, but I was talking
about blocking files that have the URI reference, like:
  <Relationship Id="rId996" Type="
http://schemas.openxmlformats.org/officeDocument/2006/relationships/oleObject";
Target="hxxps://www[.]xmlformats[.]com/office/word/2022/wordprocessingDrawing/RDF842l.html!"
TargetMode="External"/>

Basically, if a document has an external reference, strip the file out of
the email, essentially inspecting it like we do .docx files looking for bad
content - similar to removing a PDF that contains javascript.


On Mon, Jun 13, 2022 at 3:55 AM Thomas Eckardt <thomas.ecka...@thockar.com>
wrote:

> This is not possible because:
>
> ....
> Note that the suspicious scheme ("ms-msdt:/")* is** not **present in the
> document*. It's present in the first stage payload that will be
> downloaded by Office.
> ....
> and
> ....
> The document contains an external reference *pointing to a malicious URL*:
> ....
>
> If the malicious URL is known, it can be detected by assp using URIBL.
> Keep in mind that those malicious URL's can be generated and changed very
> quickly!
>
> >Hopefully clamav will eventually catch it,
>
> I don't think this is possible for every case. Also traditional AV
> scanners need to know all used malicious URL's. Only a behavior analysis of
> the document will be able to detect the malicious download and playload.
>
>
> Solutions for CVE-2022-30190 are provided by Microsoft:
>
>
> https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
>
> Thomas
>
>
>
> Von:        "K Post" <nntp.p...@gmail.com>
> An:        "ASSP development mailing list" <
> assp-test@lists.sourceforge.net>
> Datum:        31.05.2022 20:14
> Betreff:        [Assp-test] blocking new MS doc vunerability (URI attack
> vector)
> ------------------------------
>
>
>
> Hello Thomas,
>
> Any way for ASSP to block this kind of thing?
>
>
> *https://isc.sans.edu/forums/diary/New+Microsoft+Office+Attack+Vector+via+msmsdt+Protocol+Scheme+CVE202230190/28694*
> <https://isc.sans.edu/forums/diary/New+Microsoft+Office+Attack+Vector+via+msmsdt+Protocol+Scheme+CVE202230190/28694>
>
> Hopefully clamav will eventually catch it, but be nice great to be able
> strip documents off using AFC if they contain the URI protocol, just like
> we do for VBA code, etc.
>
> Thanks_______________________________________________
> Assp-test mailing list
> Assp-test@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/assp-test
>
>
>
>
> DISCLAIMER:
> *******************************************************
> This email and any files transmitted with it may be confidential, legally
> privileged and protected in law and are intended solely for the use of the
> individual to whom it is addressed.
> This email was multiple times scanned for viruses. There should be no
> known virus in this email!
> *******************************************************
>
> _______________________________________________
> Assp-test mailing list
> Assp-test@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/assp-test
>
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to