lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <B477AEE8E9E84B2A9B6F879897DF8AAD@acros.si>
Date: Fri, 6 May 2011 15:51:09 +0200
From: "Mitja Kolsek" <mitja.kolsek@...os.si>
To: <bugtraq@...urityfocus.com>
Subject: Silently Pwning Protected-Mode IE9 and Innocent Windows Applications


Our advanced binary planting research goes on... and it's time to reveal some
interesting hacks, for instance how to exploit binary planting (or DLL hijacking, if
you prefer the less suitable term) to execute remote malicious code through Internet
Explorer 9 in protected mode on Windows 7 - without issuing any security warnings. Or
how to do the same in Internet Explorer 8 on Windows XP, only even more stealthy.

The crux is described in our blog post:

http://blog.acrossecurity.com/2011/05/silently-pwning-protected-mode-ie9-and.html or
http://bit.ly/im6LcD,

while the final missing link to the exploit will be revealed at the Hack in the box
conference in Amsterdam on May 19
(http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=1399), and shortly
thereafter to the rest of the world.

Our Guidelines for developers have already been updated for those who hate seeing
binary planting, DLL hijacking, DLL preloading or insecure library loading in their
software creations:

http://www.binaryplanting.com/guidelinesDevelopers.htm


Best regards,

Mitja Kolsek
CEO&CTO

ACROS, d.o.o.
Makedonska ulica 113
SI - 2000 Maribor, Slovenia
tel: +386 2 3000 280
fax: +386 2 3000 282
web: http://www.acrossecurity.com

ACROS Security: Finding Your Digital Vulnerabilities Before Others Do
 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ