lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20030721153013.96984.qmail@web15307.mail.bjs.yahoo.com>
From: liudieyuinchina at yahoo.com.cn (Liu Die Yu)
Subject: "windows update activex"

signed vulnerable small "addon" is pretty fine!


[*]downgrade windows by installing buggy patches:
as a routine, a patch will always verify if the system
needs this patch. msie dev is good at following
routines. so i guess(i have not tried): this won't
work.

[*]i need to add new buggy features to windows.
the component doesn't need to be EXE.
(but EXE can simplify the exploit.("codeBase"))

WANTED addons:
[0]signed by microsoft.
[1]vulnerable to remote system compromise; as small as
possible.
[2]installation doesn't require "RebootMachine".
[3]not installed by default.

if you happen to have such extremely useful things,
send me a copy. :-)





(it seems yahoo!mail is making mistakes. try to call
full-disclosure again. :-)  )

 --- Liu Die Yu <liudieyuinchina@...oo.com.cn>
的正文:> if someone got something like that, i can
get the
> digest of that EXE. and your EXE can pass WinTrust
> check.
> 
> THEN:
> cross-site scripting 
> = update windows box with buggy software
> automatically
> = remote system compromise
> 
> and all we use is normal "windows update" features.
> :-)
> 
> great prosperity.
> 
> die
> 
>  --- Georgi Guninski <guninski@...inski.com>
> 的正文:>
> Liu Die Yu wrote:
> > > BUT it's hard for the attacker to execute his
> EXE.
> > > i've traced into the module("IUENGINE.TEXT").
> > > 
> > 
> > Has someone tried downgrading windoze by
> installing
> > old signed stuff (probably a
> > very old m$ patch as exe will do, or just some old
> > signed installer from m$)?
> > After downgrading, old bugs start working.
> > 
> > georgi
> > 
> > 
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter:
> http://lists.netsys.com/full-disclosure-charter.html
> 
> 
>
_________________________________________________________
> Do You Yahoo!? 
> 国内电邮用户反垃圾调查拉开帷幕
>
http://cn.rd.yahoo.com/mail_cn/tag/?http://cn.tech.yahoo.com/zhuanti/laji/index.html
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
http://lists.netsys.com/full-disclosure-charter.html 

_________________________________________________________
Do You Yahoo!? 
国内电邮用户反垃圾调查拉开帷幕
http://cn.rd.yahoo.com/mail_cn/tag/?http://cn.tech.yahoo.com/zhuanti/laji/index.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ