[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7C6C201E0341C0408688C6A7A4F923052E6DF9@LAW-MAIN.AlanPickel.com>
From: mike at alanpickel.com (Michael Evanchik)
Subject: Re: Six Step IE Remote Compromise Cache Attack
yes as i said at the top microsoft quickly patched it. The least they can do with their track record.
Mike
________________________________
From: Erwin Paternotte [mailto:e.paternotte@...ec-ss.nl]
Sent: Fri 11/14/2003 10:56 AM
To: Michael Evanchik
Cc: liudieyuinchina@...oo.com.cn
Subject: Re: [Full-Disclosure] Re: Six Step IE Remote Compromise Cache Attack
Michael Evanchik wrote:
> 1) take out the function name and brackets and all code below
> </script> in default.htm and save to make the start automatic
> 2) open MHT-ldy.mht and open it in notepad.
> 3) edit the 2 links for the .exe and the shell.htm (read step 4 on how
> that file is created) file 4o be the exact location of your exe and
> shell.htm on the server your hosting the pages(most likely you will
> need full access to the server and freehosts wont work)
> 5) change the base64 exe code to your own in MHT-ldy.mht and save
> 6) save it as shell.htm to the same location you have noted in MHT-ldy.mht
> 7) of course delete all the alert command lines in ScriptBodyJsp.asp
>
Hi,
I've tested your modifications as described above on a fully patched
Windows 2000 and IE. It seems the first step of the Six Step is blocked
by the cumulative patch included with MS03-048. I'm not sure if this is
due to the modifications you made or if this is the same for the
original Six Step. Do you know which of the vulnerabilities described in
MS03-048 are the same as the steps of the Six Step and are fixed by this
MS bulletin?
Thanks in advance for your time.
Regards,
Erwin.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031114/fb33c809/attachment.html
Powered by blists - more mailing lists