[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200401251651.i0PGp0ZY012565__40361.3777868033$1075136755@web178.megawebservers.com>
Date: Sun, 25 Jan 2004 16:51:00 -0000
From: "http-equiv@...ite.com" <1@...ware.com>
To: <bugtraq@...urityfocus.com>
Cc: <NTBugtraq@...tserv.ntbugtraq.com>
Subject: Self-Executing FOLDERS: Windows XP Explorer Part V
Sunday, January 25, 2004
The following file is a 'folder' comprising both scripting and
an executable [*.exe].
We inject scripting and an executable into the 'folder' which is
designed to point back to the executable in the 'folder' and
execute it. Provided the 'folder' is an html file, Windows XP
Explorer will execute it.
Because it is an 'folder' proper, Windows Explorer opens it. The
scripting inside is then parsed and fired. That scripting is
pointing back to the same executable file and because it is a
self-executing 'folder', it executes !
Fully self-contained harmless *.exe.
Windows XP only:
http://www.malware.com/my.pics.zip
Be aware of 'folders' out there.
--
http://www.malware.com
Powered by blists - more mailing lists