lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTin4Rt0mwSvv6GQKLb-_SxhR2EdYykkYpQZShCYK@mail.gmail.com> Date: Sat, 4 Sep 2010 12:16:06 +0800 From: YGN Ethical Hacker Group <lists@...g.net> To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, bugs@...uritytracker.com, vuln@...unia.com, secalert@...urityreason.com, news@...uriteam.com, vuln@...urity.nnov.ru Cc: Peter Van Eeckhoutte <peter.ve@...elan.be> Subject: Microsoft Internet explorer 8 DLL Hijacking (IESHIMS.DLL) I found this Microsoft Internet explorer 8 DLL Hijacking at Inject0r db http://inj3ct0r.com/exploits/13898 This one is a similar variant of IE 7 http://www.exploit-db.com/exploits/2929/ It can be triggered only if attackers can put a IESHIMS.DLL file in user's desktop. However, there are some supporting factors that trigger this exploit successful such as when user's default download location is Desktop Ref: http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
Powered by blists - more mailing lists