lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 07 Oct 2003 22:11:37 +0800
From: "Mindwarper *" <mindwarper@...uxmail.org>
To: bugtraq@...urityfocus.com
Subject: IE 6 XML Patch Bypass


IE 6 XML Patch Bypass

I have recently been playing around with the xml+windows media player exploit, and it 
seems that even with the new Microsoft patch applied, the vulnerability works.
I have tried it on 7 different people, on win2k and xp, and it worked everytime. 
The 8th person was using DAP (Download Acceselerator Plus), so it asked him if he 
wanted to download the executable. IE hacks like Dybuk Explorer are not affected by 
the vulnerability as well.

Here is a proof-of-concept:

http://mindlock.bestweb.net/wmp.htm

Note: this only works on people who have media player in C:\Program Files\Windows Media Player\ 
and version 9.

I am not 100% sure, but I believe that microsoft's new patch fixes the 401 bug. 
I tried using "HTTP/1.0 401 EVIL EVIL" so this may have been the reason for the patch bypass.

My solution would be to disable the media bar in IE 6. I explained how to do so in wmp.htm.


-----------------------------|
- Mindwarper                 |
- mindwarper@...uxmail.org   |
- http://mindlock.bestweb.net|
-----------------------------|

-- 
______________________________________________
http://www.linuxmail.org/
Now with e-mail forwarding for only US$5.95/yr

Powered by Outblaze


Powered by blists - more mailing lists