lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200305142041.h4EKfDro006065@web156.megawebservers.com>
From: 1 at malware.com (http-equiv@...ite.com)
Subject: Fwd: Re: Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! [CRITICAL]


I had sent this to bugtraq when you initially posted it, confirming 
having seen it in the past as well. Will try your html file and see 
if can get it up and running again.

Forwarded From: "http-equiv@...ite.com" 

> <!-- 
> 
> I've noticed that on my test environment it is possible to bypass 
> InternetExplorer Zones protection by flooding it with large number 
of 
> file://requests in example to infected fileserver. The result of 
this 
> bypass isEXECUTION OF ANY REQUESTED FILE. My requested file 
> was 'trojan.exe' placedon neighbour WIN2K Professional workstation. 
> To see code used during the test check files in attached archive.
> 
> On IE 6.0 the result was always the same, after more than 200 
dialog 
> boxes with 'trojan.exe' request, suddenly requested file got 
executed
>  
> -->
> 
> Excellent. Can confirm seeing this happen twice in the past two 
> years. Both in Internet Explorer and Outlook Express, using an 
iframe 
> and a remote executable on the server e.g. <iframe 
> src="http://...../malware.exe"> multiple instances on one page. One 
> slipped through and the file was executed automatically. 
> 
> Not been able to replicate since though. 
> 
> May be a combo machine power and 'confusing' IE [easier].
> 
> 
> -- 
> http://www.malware.com
> 
> 



-- 
http://www.malware.com




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ