lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1071154443.3fd8850b9c409@service.dyn.org>
From: raymond at dyn.org (Raymond Morsman)
Subject: The *real* reason the pivx unpatched IE flaws page was taken offline?

Citeren List Account <list.account@...dant.com>:

> Does anyone have an archived copy of the page(s) they would be
> willing to share with the list?

lynx -dump:

   PivX Logo
   [4]Home  |  [5]StrikeFirst  |  [6]Solutions  |  [7]Press  &  Papers  |
   [8]Clients | [9]Research | [10]Contact
 
Unpatched IE security holes
 
   Please  note:  this  site  will work in any browser and on any device,
   however  will  look  much nicer on CSS-compatible browsers. If you are
   using  a  browser  that  supports  CSS, please wait while the CSS file
   loads and this message will disappear.
   If  you  wish to enjoy the web to the fullest, please [11]upgrade to a
   standards-compatible browser.
 
Why this page ?
 
   This  page  is  a list of vulnerabilities that remain unpatched, it is
   our  hope  that the increased awareness brought forth may help further
   the research necessary to properly secure them.
   Vulnerabilities  listed  on  this  page  work  (among others) with the
   latest versions of Internet Explorer, with all patches installed.
   Until proper patches have been provided, the only fix to some of these
   vulnerabilities is to disable scripting.
   This  page  is,  and always will be, a work in progress. This is not a
   definitive list of vulnerabilities.
 
   [12]Back
 
Miscellaneous news
 
   11 September 2003: There are currently 31 unpatched vulnerabilities.
 
   The latest cumulative Internet Explorer patch
   is released August 20, 2003 with the identifier [13]MS03-032.
   Cumulative  patches  combine  all  previous  IE patches, and should be
   considered mandatory installs.
 
   11 September 2003: Added Media bar ressource injection by jelmer
   10 September 2003: Added file-protocol proxy by Liu Die Yu
   10  September  2003: Added NavigateAndFind protocol history by Liu Die
   Yu
   10 September 2003: Added window.open search injection by Liu Die Yu
   10 September 2003: Added NavigateAndFind file proxy by Liu Die Yu
   10 September 2003: Added Timed history injection by Liu Die Yu
   10 September 2003: Added history.back method caching by Liu Die Yu
   10 September 2003: Added Click hijacking by Liu Die Yu
   9 September 2003: Re-added Re-evaluating HTML elavation
   26 August 2003: Added ADODB.Stream local file writing by jelmer
   20  August 2003: Changed latest cumulative IE patch link, [14]MS03-032
   released
   5 August 2003: Added Notepad popups by Richard M. Smith
   4 August 2003: Added protocol control chars by badWebMasters
   [15]Older news...
 
Unpatched vulnerabilities
 
   Media bar ressource injection
   Description: Arbitrary file download and execution, by ability to load
   ressource files in a window object
   Reference:
   [16]http://lists.netsys.com/pipermail/full-disclosure/2003-September/0
   09917.html
   Exploit: [17]http://ip3e83566f.speed.planet.nl/hacked-by-chinese/5.htm
 
   file-protocol proxy
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [18]http://safecenter.net/liudieyu/WsOpenFileJPU/WsOpenFileJPU-Content
   .HTM
   Exploit:
   [19]http://safecenter.net/liudieyu/WsOpenFileJPU/WsOpenFileJPU-MyPage.
   HTM
 
   NavigateAndFind protocol history
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [20]http://safecenter.net/liudieyu/NAFjpuInHistory/NAFjpuInHistory-Con
   tent.HTM
   Exploit:
   [21]http://safecenter.net/liudieyu/NAFjpuInHistory/NAFjpuInHistory-MyP
   age.HTM
 
   window.open search injection
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [22]http://safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-Content.HTM
   Exploit:
   [23]http://safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.htm
 
   NavigateAndFind file proxy
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [24]http://safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-Content.HTM
   Exploit:
   [25]http://safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-MyPage.htm
 
   Timed history injection
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [26]http://safecenter.net/liudieyu/BackMyParent2/BackMyParent2-Content
   .HTM
   Exploit:
   [27]http://www.safecenter.net/liudieyu/BackMyParent2/BackMyParent2-MyP
   age.HTM
 
   history.back method caching
   Description:   cross-domain   scripting,  cookie/data/identity  theft,
   command execution
   Reference:
   [28]http://safecenter.net/liudieyu/RefBack/RefBack-Content.HTM
   Exploit:
   [29]http://www.safecenter.net/liudieyu/RefBack/RefBack-MyPage.HTM
 
   Click hijacking
   Description: Pointing IE mouse events at non-IE/system windows
   Reference:
   [30]http://safecenter.net/liudieyu/HijackClick/HijackClick-Content.HTM
   Exploit:
   [31]http://safecenter.net/liudieyu/HijackClick/HijackClick2-MyPage.HTM
 
   Re-evaluating HTML elavation dataSrc command execution
   Description: Allows execution of arbitrary commands in Local Zones
   Detail:  This  bug  is  related  to  the  codebase local path bug, but
   details the actual issue and runs without scripting or ActiveX enabled
   Published: February 28th 2002
   Reference: [32]http://security.greymagic.com/adv/gm001-ie/
   Example exploit:
   [33]http://security.greymagic.com/adv/gm001-ie/advbind.asp
   Note: See [34]6th May 2003 Notes.
   Notes September 2003:
   Renamed   and   re-added,   symptom  fixed  instead  of  problem.  Now
   demonstrates how to reach HTA functionality.
   Reference:
   [35]http://msgs.securepoint.com/cgi-bin/get/bugtraq0309/83.html
   Example exploit: [36]http://www.malware.com/badnews.html
   Example exploit without scripting:
   [37]http://www.malware.com/greymagic.html
   Temporary   workaround:   Change   the  mime-type  application/hta  to
   something else
 
   ADODB.Stream local file writing
   Description: Planting arbitrary files on the local file system
   Exploit:      [38]http://ip3e83566f.speed.planet.nl/eeye.html     (but
   unrelated to the EEye exploit)
 
   Notepad popups
   Description: Opening popup windows without scripting
   Reference: [39]http://computerbytesman.com/security/notepadpopups.htm
   Followup:
   [40]http://msgs.securepoint.com/cgi-bin/get/bugtraq0308/55.html
   Note:  This  is  just  an  example  of the problem, this entry will be
   replaced when more material is published
 
   protocol control chars
   Description: Circumventing content filters
   Reference: [41]http://badwebmasters.net/advisory/012/
   Exploit: [42]http://badwebmasters.net/advisory/012/test2.asp
 
   WMP local file bounce
   Description:  Switching  security  zone,  arbitrary command execution,
   automatic email-borne command execution
   Reference:
   [43]http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0307&L=ntb
   ugtraq&F=P&S=&P=6783
   Exploit: [44]http://www.malware.com/once.again!.html
 
   HTTP error handler Local Zone XSS
   Description: HTML/Script injection in the Local Zone
   Reference: [45]http://sec.greymagic.com/adv/gm014-ie/
   Exploit: [46]http://sec.greymagic.com/adv/gm014-ie/
 
   XSS in Unparsable XML Files
   Description:  Cross-Site  Scripting on any site hosting files that can
   be misrendered in MSXML
   Reference: [47]http://sec.greymagic.com/adv/gm013-ie/
   Exploit: [48]http://sec.greymagic.com/adv/gm013-ie/
 
   Alexa Related Privacy Disclosure
   Description:  Unintended  disclosure of private information when using
   the Related feature
   Reference: [49]http://www.secunia.com/advisories/8955/
   Reference: [50]http://www.imilly.com/alexa.htm
 
   Basic Authentication URL spoofing
   Description: Spoofing the URL displayed in the Address bar
   Reference:
   [51]http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/15.html
 
   DNSError folder disclosure
   Description: Gaining access to local security zones
   Reference:
   [52]http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/52.html
 
   mhtml wecerr CAB flip
   Description: Delivery and installation of an executable
   Reference:
   [53]http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/48.html
 
   WebFolder data Injection
   Description: Injecting arbitrary data in the My Computer zone
   Reference:
   [54]http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/13.html
 
   codebase local path
   Description: Allows execution of arbitrary commands in Local Zones
   Hinted: June 25th 2000 by Dildog
   Reference: [55]http://online.securityfocus.com/archive/1/66869
   Hinted: November 23rd 2000 by Georgi Guninski
   Reference: [56]http://www.guninski.com/parsedat-desc.html
   Published:  January  10th  2002,  by  thePull (incorrectly labeled the
   "Popup object" vulnerability)
   Reference:
   [57]http://home.austin.rr.com/wiredgoddess/thepull/advisory4.html
   Example exploit:
   [58]http://home.austin.rr.com/wiredgoddess/thepull/funRun.html
   Note: See [59]6th May 2003 Notes.
 
   Web Archive buffer overflow
   Description: Possible automated code execution.
   Reference:
   [60]http://msgs.securepoint.com/cgi-bin/get/bugtraq0303/107.html
 
   dragDrop invocation
   Description:  Arbitrary  local  file  reading  through  native Windows
   dragDrop invocation.
   Reference:
   [61]http://msgs.securepoint.com/cgi-bin/get/bugtraq0302/12.html
   Exploit: [62]http://kuperus.xs4all.nl/security/ie/xfiles.htm
 
   document.domain parent DNS resolver
   Description: Improper duality check leading to firewall breach
   Published: July 29 2002
   Reference:
   [63]http://online.securityfocus.com/archive/1/284908/2002-07-27/2002-0
   8-02/0
 
   FTP Folder View XSS
   Description:  Elevating  privileges, running script in the My Computer
   zone, arbitrary command execution, etc.
   Published: June 7th 2002 (Microsoft was notified December 21st 2001.)
   Reference:
   [64]http://www.geocities.co.jp/SiliconValley/1667/advisory02e.html
   Exploit: [65]http://jscript.dk/Jumper/xploit/ftpfolderview.html
 
   DynSrc Local File detection
   Description: Detect if a local file exists, and read its size/date
   Published: March 27th 2002
   Reference: [66]http://security.greymagic.com/adv/gm003-ie/
   Status:  Patched in IE6 by [67]IE6 Service Pack 1, but IE5 and 5.5 are
   still vulnerable.
 
   Security zone transfer
   Description: Automatically opening IE + Executing attachments
   Published: March 22nd 2002
   Reference: [68]http://security.greymagic.com/adv/gm002-ie/
 
   Extended HTML Form Attack
   Description:  Cross  Site  Scripting  through non-HTTP ports, stealing
   cookies, etc.
   Published: February 6th 2002
   Reference:
   [69]http://eyeonsecurity.org/advisories/multple-web-browsers-vulnerabl
   e-to-extended-form-attack.htm
 
   "script src" local file enumeration
   Description:  Enables a malicious programmer to detect if a local file
   exists.
   Published: January 3rd 2002
   Reference: [70]http://www.securityfocus.com/bid/3779
   Example exploit: [71]http://jscript.dk/Jumper/xploit/scriptsrc.html
 
   IE https certificate attack
   Description:  Undetected  SSL  man-in-the-middle  attacks,  decrypting
   SSL-encrypted traffic in realtime
   Published: December 22 2001 ( Stefan Esser )
   Published: June 6 2000 ( ACROS )
   Reference: [72]http://security.e-matters.de/advisories/012001.html
   Example exploit: [73]http://suspekt.org/
   Status:   Initially   fixed   in  IE4  and  early  IE5s  by  MS00-039,
   re-introduced by a later patch.
 
Patched vulnerabilities
 
   These  used  to  be  listed  on  this page, but have now been patched.
   Hopefully, this means that this page is working as expected.
 
   Content-Disposition/Type
   Description: Allows spoofing of filename in download dialog
   Published: November 26th 2001
   Reference:
   [74]http://www.securityfocus.com/cgi-bin/archive.pl?id=1&threads=1&tid
   =242376
   Patched: December 13th 2001 (
   [75]http://www.microsoft.com/technet/security/bulletin/MS01-058.asp )
   Re-Published: December 16th (by HTTP-EQUIV, patch didn't work)
   Reference: [76]http://online.securityfocus.com/archive/88/245822
   Example exploit: [77]http://jscript.dk/Jumper/xploit/contentspoof.asp
   [78]Finally patched by MS02-005 (nice touch about blurring Open)
 
   XMLHTTP
   Description: Allows reading of local files
   Published: December 15th 2001
   Reference: [79]http://www.securityfocus.com/bid/3699
   Example exploit: [80]http://jscript.dk/Jumper/xploit/xmlhttp.asp
   [81]Finally completely patched by MS02-008
 
   document.open
   Description: Allows cross-domain scripting (reading cookies from other
   site, etc.)
   Published: December 19th 2001
   Reference: [82]http://www.securityfocus.com/bid/3721
   Example          exploits:         [83]http://tom.me.uk/MSN/         &
   [84]http://home.austin.rr.com/wiredgoddess/thepull/advisory3.html
   [85]Patched by MS02-005
 
   GetObject
   Description: Allows reading of local files (any type, even binary)
   Published: January 1st 2002
   Reference: [86]http://www.securityfocus.com/bid/3767
   Example exploit: [87]http://jscript.dk/Jumper/xploit/GetObject.html
   [88]Patched by MS02-005
 
   Cookie-based Script Execution
   Description: Injecting script in the Local Zone.
   Published: April 3rd 2002
   Reference: [89]http://online.securityfocus.com/archive/1/265459
   Status: Partly patched by [90]MS02-015, easily circumvented.
   [91]Patched by MS02-023
 
   File download execution
   Description: Download and execute any program automatically
   Published: March 18th 2002
   Reference:
   [92]http://www.lac.co.jp/security/english/snsadv_e/48_e.html
   History: Added March 23rd, removed March 26th, re-added March 27th
   Details: [93]http://www.newsbytes.com/news/02/175484.html
   [94]Patched by MS02-023
 
   OWC Local File Detection
   Description: Multiple local files detection issues
   Published: April 8th 2002
   Reference: [95]http://security.greymagic.com/adv/gm008-ie/
   Exploit: [96]http://security.greymagic.com/adv/gm008-ie/
   [97]Pached by MS02-044
 
   OWC Clipboard Access
   Description: Complete clipboard access even with Clipboard Disabled
   Published: April 8th 2002
   Reference: [98]http://security.greymagic.com/adv/gm007-ie/
   Exploit: [99]http://security.greymagic.com/adv/gm007-ie/
   [100]Pached by MS02-044
 
   OWC Local File Reading
   Description: Reading local and remote files with OWC in IE
   Published: April 8th 2002
   Reference: [101]http://security.greymagic.com/adv/gm006-ie/
   Exploit: [102]http://security.greymagic.com/adv/gm006-ie/
   [103]Pached by MS02-044
 
   OWC Scripting
   Description: Running script even with Scripting Disabled
   Published: April 8th 2002
   Reference: [104]http://security.greymagic.com/adv/gm005-ie/
   Exploit: [105]http://security.greymagic.com/adv/gm005-ie/advowcscr.asp
   [106]Pached by MS02-044
 
   Remote dialogArguments interaction
   Description:  Elevating  privileges,  hijacking MSN Messenger, running
   script in the My Computer zone, arbitrary command execution, etc.
   Published: April 16th 2002
   Reference: [107]http://jscript.dk/adv/TL002/
   Exploit: [108]http://jscript.dk/adv/TL002/
   Appendix:  Extending  the  vulnerable version from just IE6 to IE5 and
   higher.
   Reference and exploit:
   [109]http://security.greymagic.com/adv/gm001-ax/
   Status: Partly patched by [110]MS02-023, IE6 appears fixed while IE5.5
   and 5 are still wide open.
   Patched by MS02-047
 
   Gopher buffer overflow
   Description: Delivery and execution of arbitrary code
   Published: June 4th 2002
   Reference:
   [111]http://www.solutions.fi/index.cgi/news_2002_06_04?lang=en
   Workaround:
   [112]http://www.microsoft.com/technet/security/bulletin/MS02-027.asp
   Third-party fix: [113]http://www.pivx.com/gopher_smoker.html
   Patched by MS02-047
 
   object Cross Domain Scripting
   Description:  Elevating privileges, arbitrary command execution, local
   file reading, stealing arbitrary cookies, etc.
   Published: July 10 2002
   Reference: [114]http://www.pivx.com/larholm/adv/TL003/
   Exploit: [115]http://www.pivx.com/larholm/adv/TL003/
   Patched by MS02-047
 
   IE dot bug
   Description: Overriding filetype handlers on local files
   Published: May 19th 2002
   Reference:
   [116]http://online.securityfocus.com/archive/1/273168/2002-05-18/2002-
   05-24/0
   Patched by MS02-047
 
   XP Help deleter
   Description: Arbitrary local file/folder deletion.
   Published: August 15 2002
   Reference:
   [117]http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00224.htm
   l
   Exploit: [118]http://jscript.dk/2002/8/sec/xphelpdelete.html
   [119]Patched by Windows XP SP1
 
   delegated SSL authority
   Description: HTTPS spoofing, man-in-the-middle attacks, etc.
   Published: August 6 2002
   Reference: [120]http://www.thoughtcrime.org/ie-ssl-chain.txt
   Reference: [121]http://arch.ipsec.pl/inteligo.html
   Exploit: [122]http://www.thoughtcrime.org/ie.html
   [123]Appears patched by MS02-050
 
   Who framed Internet Explorer
   Description:  Cross-protocol  scripting,  arbitrary command execution,
   local  file  reading,  cookie  theft, website forging, sniffing https,
   etc.
   Published: September 9 2002
   Reference: [124]http://sec.greymagic.com/adv/gm010-ie/
   Exploit: [125]http://sec.greymagic.com/adv/gm010-ie/wfsimple.html
   Patched by MS02-066
 
   iframe Document - The D-day
   Description:  Circumventing  zone sandboxing, XSS, cookie theft, local
   file reading / execution
   Published: October 15 2002
   Reference: [126]http://security.greymagic.com/adv/gm011-ie/
   Exploits: [127]http://security.greymagic.com/adv/gm011-ie/
   Patched by MS02-066
 
   object zone redirection
   Description: Circumventing the zone restrictions introduced by IE6 SP1
   Published: September 10 2002
   Reference: [128]http://www.pivx.com/larholm/adv/TL005/
   Reference: [129]http://online.securityfocus.com/bid/5730/discussion/
   Patched by MS02-066
 
   showModalDialog method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [130]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [131]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   createRange method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [132]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [133]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   elementFromPoint method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [134]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [135]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   getElementById method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [136]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [137]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   getElementsByName method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [138]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [139]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   getElementsByTagName method caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [140]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [141]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   execCommand method caching
   Description: Read access to the foreign document.
   Published: October 22 2002
   Reference:    [142]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [143]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   Patched by MS02-066
 
   document.write method caching
   Description: Spoofing of content
   Published: October 21 2002
   Reference:
   [144]http://online.securityfocus.com/archive/1/296371/2002-10-19/2002-
   10-25/0
   Exploit: [145]http://clik.to/liudieyu ==> SaveRef_DocumentWrite-MyPage
   section.
   Patched by MS02-066
 
   "assign" method caching
   Description:  Circumventing zone sandboxing, cross-protocol scripting,
   cookie theft, and possible local file reading / execution
   Published: October 1 2002
   Reference:
   [146]http://online.securityfocus.com/archive/1/293692/2002-09-29/2002-
   10-05/0
   Exploit:
   [147]http://www16.brinkster.com/liudieyu/SaveRef/SaveRef-MyPage.htm
   Exploit:      [148]http://jscript.dk/2002/10/sec/SaveRefLocalFile.html
   (local file reading and execution)
   Patched by MS02-066
 
   Slash URL encoding XSS
   Description: Arbitrary Cross Domain Scripting, cookie theft, etc.
   Published: September 3 2002
   Reference:
   [149]http://online.securityfocus.com/archive/1/290220/2002-09-01/2002-
   09-07/0
   Exploit:
   [150]http://www16.brinkster.com/liudieyu/2FforMSIE/2FforMSIE-MyPage.ht
   m
   Patched by MS02-066
 
   HTML Help ActiveX
   Description: stack and heap based buffer overflows, DOS
   Published: May 27th 2002
   Reference: [151]http://www.nextgenss.com/vna/ms-whelp.txt
   Reference: [152]http://online.securityfocus.com/bid/4857
   Believed to be Patched by MS02-066
 
   external object caching
   Description:  Circumventing  security  zones, XSS, cookie theft, local
   file reading / execution, etc.
   Published: October 22 2002
   Reference:    [153]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [154]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   [155]Patched by MS02-068
 
   MS JVM native method vulnerabilities
   Description:  A collection of at least 10 different vulnerabilities in
   the  MS JVM, escaping the sandbox, local file reading, silent delivery
   and execution of arbitrary programs, etc.
   Published: September 9 2002
   Reference:
   [156]http://www.solutions.fi/index.cgi/news_2002_09_09?lang=eng
   [157]Patched by MS03-011
 
   Self-executing HTML Help
   Description: Delivery and execution of arbitrary programs
   Published: June 1st 2002
   Reference: [158]http://www.malware.com/yelp.html
   Reference: [159]http://online.securityfocus.com/archive/1/275126
   Exploit: [160]http://www.malware.com/html.zip
   [161]Patched by MS03-015
 
   cross-frame dialogArguments access
   Description:  Circumventing  security  zones,  local  file  reading  /
   execution, etc.
   Published: November 20 2002
   Reference:
   [162]http://online.securityfocus.com/archive/1/300525/2002-11-17/2002-
   11-23/0
   Exploit:
   [163]http://www16.brinkster.com/liudieyu/BadParent/BadParent-MyPage.ht
   m
   Extended Exploit: [164]http://security.greymagic.com/misc/globalDgArg/
   [165]Patched by MS03-015
 
   clipboardData object caching
   Description:   Read/write  access  to  the  clipboard,  regardless  of
   settings.
   Published: October 22 2002
   Reference:    [166]http://sec.greymagic.com/adv/gm012-ie   (cumulative
   advisory)
   Exploit:     [167]http://sec.greymagic.com/adv/gm012-ie    (cumulative
   advisory)
   [168]Patched by MS03-015
 
   Java XMLDSO base tag
   Description: Arbitrary local file reading.
   Published: August 17 2002
   Reference:
   [169]http://online.securityfocus.com/archive/1/287895/2002-08-15/2002-
   08-21/0
   Exploit: [170]http://www.xs4all.nl/~jkuperus/msieread.htm
   Patched by [171]MS03-011 and [172]MS03-015
 
   CTRL-key file upload focus
   Description:  Local  file reading, downloading and executing arbitrary
   code.
   Published: July 23 2002
   Reference:
   [173]http://online.securityfocus.com/archive/1/283866/2002-07-21/2002-
   07-27/0
   Exploit:           [174]http://jscript.dk/2002/7/sec/sandbladctrl.html
   (corrected to include SHIFT)
   [175]Patched by MS03-015
 
   Back Button CSS
   Description: Read cookies/local files and execute code (triggered when
   user hits the back button)
   Published: April 15th 2002
   Reference: [176]http://online.securityfocus.com/archive/1/267561
   [177]Patched by MS03-015
 
   HELP.dropper (IE6, OE6, Outlook)
   Description:  Silent  delivery  and installation of an executable on a
   target computer
   Published: March 28th 2002
   Reference and example exploit:
   [178]http://www.malware.com/lookout.html
   Reference: [179]http://online.securityfocus.com/archive/1/264590
   [180]Patched by MS03-015
 
   JVM Bytecode Verifier
   Description: Escaping applet sandbox restrictions, taking any action.
   Published: November 21 2002
   Reference:
   [181]http://msgs.securepoint.com/cgi-bin/get/bugtraq0211/255.html
   Reference / POC: [182]http://lsd-pl.net/java_security.html
   [183]Patched by MS03-011
 
   Embedded files XSS
   Description: XSS to arbitrary sites, cookie theft
   Reference:
   [184]http://msgs.securepoint.com/cgi-bin/get/bugtraq0212/218.html
   Exploit:
   [185]http://www16.brinkster.com/liudieyu/viaSWFurl/viaSWFurl-MyPage.ht
   m
   [186]Patched by MS03-015
 
   dialog style XSS
   Description: security zone XSS, cookie theft, monitoring the user.
   Published: December 3 2002
   Reference:
   [187]http://msgs.securepoint.com/cgi-bin/get/bugtraq0212/29.html
   Exploit: [188]http://jscript.dk/2002/11/sec/diemodalstyleXSS.html
   [189]Patched by MS03-015
 
   WMP Stench
   Description:  Silent  delivery  and installation of an executable on a
   target computer
   Published: August 21 2002
   Reference: [190]http://www.malware.com/stench.html
   Exploit: [191]http://www.malware.com/malware.php
   [192]Patched by MS03-015
 
   cssText Local File Reading
   Description: Reading portions of local files, depending on structure.
   Published: April 2nd 2002
   Reference: [193]http://security.greymagic.com/adv/gm004-ie/
   Exploit: [194]http://security.greymagic.com/adv/gm004-ie/
   [195]Patched by MS03-015
 
   object longtype
   Description: Code execution
   Reference:
   [196]http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/49.html
   Exploit:
   [197]http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/78.html
   [198]Patched by MS03-020
 
   remote file request flooding
   Description: Arbitrary remote file execution
   Reference:
   [199]http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/130.html
   Reference:
   [200]http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/147.html
   Exploit: [201]http://www.malware.com/forceframe.html
   [202]Patched by MS03-020
 
   local file request flooding
   Description: Arbitrary local file execution
   Reference:
   [203]http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/85.html
   [204]Patched by MS03-020
 
   align buffer overflow
   Description: Buffer overflow, arbitrary code execution
   Reference:
   [205]http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/170.html
   [206]Patched by MS-3_023
 
Related patches
 
   MS02-008
   Patches: XMLHTTP
   Published: February 22nd 2002 (21st February in USA)
   Location:
   [207]http://www.microsoft.com/technet/security/bulletin/MS02-008.asp
 
   MS02-044
   Patches:  OWC  Local  File  Detection, OWC Clipboard Access, OWC Local
   File Reading & OWC Scripting
   Published: August 20th 2002
   Location:
   [208]http://microsoft.com/technet/security/bulletin/MS02-044.asp
 
   IE6 Service Pack 1
   Patches: cssText and DynSrc
   Published: September 9th 2002
   Location:
   [209]http://microsoft.com/windows/ie/downloads/critical/ie6sp1/
 
   Windows XP Service Pack 1
   Patches: Everything IE6 SP1 patches, and XP Help deleter
   Published: September 9th 2002
   Location:
   [210]http://www.microsoft.com/WindowsXP/pro/downloads/servicepacks/sp1
   /
 
   MS02-050
   Patches: delegated SSL authority
   Published: September 4th 2002, last updated October 17th 2002
   Location:
   [211]http://microsoft.com/technet/security/bulletin/MS02-050.asp
 
   MS03-011
   Patches:    ByteCode   Verifier   and   all   previous   JVM   related
   vulnerabilities, this is MS JVM build 3810.
   Published: April 9th 2003
   Location:
   [212]http://www.microsoft.com/technet/security/bulletin/MS03-011.asp
 
   MS03-020
   Notice:  This  is  the  latest  IE cumulative patch. This combines all
   previous IE patches.
   Patches: object longtype overflow
   Published: June 4th 2003
   Location:
   [213]http://www.microsoft.com/technet/security/bulletin/MS03-020.asp
 
   MS03-032
   Notice:  This  is  the  latest  IE cumulative patch. This combines all
   previous IE patches.
   Patches:   OBJECT   HTA   execution,  and  other  not  publicly  known
   vulnerabilities
   Published: August 20th 2003
   Location:
   [214]http://www.microsoft.com/technet/security/bulletin/MS03-032.asp
 
   MS03-023
   Patches: align buffer overflow
   Published: July 10 2003
   Location:
   [215]http://www.microsoft.com/technet/security/bulletin/MS03-023.asp
 
Who
 
   Please   mail   any   questions   or   comments   to  Thor  Larholm  -
   [216]thor@...x.com
   thor (at) pivx (dot) com
   Copyright 2002 Pivx Solutions, LLC. All rights reserved.
 
References
 
   1. http://www.google.com/help/features.html#cached
   2. http://www.pivx.com/larholm/unpatched/
   3. http://www.pivx.com/larholm/unpatched/
   4. http://www.pivx.com/main.html
   5. http://www.pivx.com/sf.html
   6. http://www.pivx.com/solutions.html
   7. http://www.pivx.com/writings.html
   8. http://www.pivx.com/clients.html
   9. http://www.pivx.com/research/
  10. http://www.pivx.com/contact.html
  11. http://www.webstandards.org/upgrade/
  12. http://www.pivx.com/larholm/
  13.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_032
  14.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_032
  15. http://www.pivx.com/larholm/unpatched/archivednews.html
  16. http://lists.netsys.com/pipermail/full-disclosure/2003-September/009917.html
  17. http://ip3e83566f.speed.planet.nl/hacked-by-chinese/5.htm
  18. http://safecenter.net/liudieyu/WsOpenFileJPU/WsOpenFileJPU-Content.HTM
  19. http://safecenter.net/liudieyu/WsOpenFileJPU/WsOpenFileJPU-MyPage.HTM
  20. http://safecenter.net/liudieyu/NAFjpuInHistory/NAFjpuInHistory-Content.HTM
 21. http://safecenter.net/liudieyu/NAFjpuInHistory/NAFjpuInHistory-MyPage.HTM
  22. http://safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-Content.HTM
  23. http://safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.htm
  24. http://safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-Content.HTM
  25. http://safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-MyPage.htm
  26. http://safecenter.net/liudieyu/BackMyParent2/BackMyParent2-Content.HTM
  27. http://www.safecenter.net/liudieyu/BackMyParent2/BackMyParent2-MyPage.HTM
  28. http://safecenter.net/liudieyu/RefBack/RefBack-Content.HTM
  29. http://www.safecenter.net/liudieyu/RefBack/RefBack-MyPage.HTM
  30. http://safecenter.net/liudieyu/HijackClick/HijackClick-Content.HTM
  31. http://safecenter.net/liudieyu/HijackClick/HijackClick2-MyPage.HTM
  32. http://security.greymagic.com/adv/gm001-ie/
  33. http://security.greymagic.com/adv/gm001-ie/advbind.asp
  34. http://www.pivx.com/larholm/unpatched/6may03notes.html
  35. http://msgs.securepoint.com/cgi-bin/get/bugtraq0309/83.html
  36. http://www.malware.com/badnews.html
  37. http://www.malware.com/greymagic.html
  38. http://ip3e83566f.speed.planet.nl/eeye.html
  39. http://computerbytesman.com/security/notepadpopups.htm
  40. http://msgs.securepoint.com/cgi-bin/get/bugtraq0308/55.html
  41. http://badwebmasters.net/advisory/012/
  42. http://badwebmasters.net/advisory/012/test2.asp
  43.
http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0307&L=ntbugtraq&F=P&S=&P=6783
  44. http://www.malware.com/once.again%21.html
  45. http://sec.greymagic.com/adv/gm014-ie/
  46. http://sec.greymagic.com/adv/gm014-ie/
  47. http://sec.greymagic.com/adv/gm013-ie/
  48. http://sec.greymagic.com/adv/gm013-ie/
  49. http://www.secunia.com/advisories/8955/
  50. http://www.imilly.com/alexa.htm
  51. http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/15.html
  52. http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/52.html
  53. http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/48.html
  54. http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/13.html
  55. http://online.securityfocus.com/archive/1/66869
  56. http://www.guninski.com/parsedat-desc.html
  57. http://home.austin.rr.com/wiredgoddess/thepull/advisory4.html
  58. http://home.austin.rr.com/wiredgoddess/thepull/funRun.html
  59. http://www.pivx.com/larholm/unpatched/6may03notes.html
  60. http://msgs.securepoint.com/cgi-bin/get/bugtraq0303/107.html
  61. http://msgs.securepoint.com/cgi-bin/get/bugtraq0302/12.html
  62. http://kuperus.xs4all.nl/security/ie/xfiles.htm
  63. http://online.securityfocus.com/archive/1/284908/2002-07-27/2002-08-02/0
  64. http://www.geocities.co.jp/SiliconValley/1667/advisory02e.html
  65. http://jscript.dk/Jumper/xploit/ftpfolderview.html
  66. http://security.greymagic.com/adv/gm003-ie/
  67. http://www.pivx.com/larholm/unpatched/patch_IE6SP1
  68. http://security.greymagic.com/adv/gm002-ie/
  69.
http://eyeonsecurity.org/advisories/multple-web-browsers-vulnerable-to-extended-form-attack.htm
  70. http://www.securityfocus.com/bid/3779
  71. http://jscript.dk/Jumper/xploit/scriptsrc.html
  72. http://security.e-matters.de/advisories/012001.html
  73. http://suspekt.org/
  74. http://www.securityfocus.com/cgi-bin/archive.pl?id=1&threads=1&tid=242376
  75. http://www.microsoft.com/technet/security/bulletin/MS01-058.asp
  76. http://online.securityfocus.com/archive/88/245822
  77. http://jscript.dk/Jumper/xploit/contentspoof.asp
  78.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS05
  79. http://www.securityfocus.com/bid/3699
  80. http://jscript.dk/Jumper/xploit/xmlhttp.asp
  81.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS08
  82. http://www.securityfocus.com/bid/3721
  83. http://tom.me.uk/MSN/
  84. http://home.austin.rr.com/wiredgoddess/thepull/advisory3.html
  85.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS05
  86. http://www.securityfocus.com/bid/3767
  87. http://jscript.dk/Jumper/xploit/GetObject.html
  88.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS05
  89. http://online.securityfocus.com/archive/1/265459
  90. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS15
  91.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS23
  92. http://www.lac.co.jp/security/english/snsadv_e/48_e.html
  93. http://www.newsbytes.com/news/02/175484.html
  94.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS23
  95. http://security.greymagic.com/adv/gm008-ie/
  96. http://security.greymagic.com/adv/gm008-ie/
  97.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS02_044
  98. http://security.greymagic.com/adv/gm007-ie/
  99. http://security.greymagic.com/adv/gm007-ie/
 100.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS02_044
 101. http://security.greymagic.com/adv/gm006-ie/
 102. http://security.greymagic.com/adv/gm006-ie/
 103.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS02_044
 104. http://security.greymagic.com/adv/gm005-ie/
 105. http://security.greymagic.com/adv/gm005-ie/advowcscr.asp
 106.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS02_044
 107. http://jscript.dk/adv/TL002/
 108. http://jscript.dk/adv/TL002/
 109. http://security.greymagic.com/adv/gm001-ax/
 110.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS23
 111. http://www.solutions.fi/index.cgi/news_2002_06_04?lang=en
 112. http://www.microsoft.com/technet/security/bulletin/MS02-027.asp
 113. http://www.pivx.com/gopher_smoker.html
 114. http://www.pivx.com/larholm/adv/TL003/
 115. http://www.pivx.com/larholm/adv/TL003/
 116. http://online.securityfocus.com/archive/1/273168/2002-05-18/2002-05-24/0
 117. http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00224.html
 118. http://jscript.dk/2002/8/sec/xphelpdelete.html
 119.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_XSP1
 120. http://www.thoughtcrime.org/ie-ssl-chain.txt
 121. http://arch.ipsec.pl/inteligo.html
 122. http://www.thoughtcrime.org/ie.html
 123.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS02_050
 124. http://sec.greymagic.com/adv/gm010-ie/
 125. http://sec.greymagic.com/adv/gm010-ie/wfsimple.html
 126. http://security.greymagic.com/adv/gm011-ie/
 127. http://security.greymagic.com/adv/gm011-ie/
 128. http://www.pivx.com/larholm/adv/TL005/
 129. http://online.securityfocus.com/bid/5730/discussion/
 130. http://sec.greymagic.com/adv/gm012-ie
 131. http://sec.greymagic.com/adv/gm012-ie
 132. http://sec.greymagic.com/adv/gm012-ie
 133. http://sec.greymagic.com/adv/gm012-ie
 134. http://sec.greymagic.com/adv/gm012-ie
 135. http://sec.greymagic.com/adv/gm012-ie
 136. http://sec.greymagic.com/adv/gm012-ie
 137. http://sec.greymagic.com/adv/gm012-ie
 138. http://sec.greymagic.com/adv/gm012-ie
 139. http://sec.greymagic.com/adv/gm012-ie
 140. http://sec.greymagic.com/adv/gm012-ie
 141. http://sec.greymagic.com/adv/gm012-ie
 142. http://sec.greymagic.com/adv/gm012-ie
 143. http://sec.greymagic.com/adv/gm012-ie
 144. http://online.securityfocus.com/archive/1/296371/2002-10-19/2002-10-25/0
 145. http://clik.to/liudieyu
 146. http://online.securityfocus.com/archive/1/293692/2002-09-29/2002-10-05/0
 147. http://www16.brinkster.com/liudieyu/SaveRef/SaveRef-MyPage.htm
 148. http://jscript.dk/2002/10/sec/SaveRefLocalFile.html
 149. http://online.securityfocus.com/archive/1/290220/2002-09-01/2002-09-07/0
 150. http://www16.brinkster.com/liudieyu/2FforMSIE/2FforMSIE-MyPage.htm
 151. http://www.nextgenss.com/vna/ms-whelp.txt
 152. http://online.securityfocus.com/bid/4857
 153. http://sec.greymagic.com/adv/gm012-ie
 154. http://sec.greymagic.com/adv/gm012-ie
 155. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS02_068
 156. http://www.solutions.fi/index.cgi/news_2002_09_09?lang=eng
 157.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_011
 158. http://www.malware.com/yelp.html
 159. http://online.securityfocus.com/archive/1/275126
 160. http://www.malware.com/html.zip
 161. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 162. http://online.securityfocus.com/archive/1/300525/2002-11-17/2002-11-23/0
 163. http://www16.brinkster.com/liudieyu/BadParent/BadParent-MyPage.htm
 164. http://security.greymagic.com/misc/globalDgArg/
 165. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 166. http://sec.greymagic.com/adv/gm012-ie
 167. http://sec.greymagic.com/adv/gm012-ie
 168. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 169. http://online.securityfocus.com/archive/1/287895/2002-08-15/2002-08-21/0
 170. http://www.xs4all.nl/%7Ejkuperus/msieread.htm
 171.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_011
 172.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_015
 173. http://online.securityfocus.com/archive/1/283866/2002-07-21/2002-07-27/0
 174. http://jscript.dk/2002/7/sec/sandbladctrl.html
 175. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 176. http://online.securityfocus.com/archive/1/267561
 177. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 178. http://www.malware.com/lookout.html
 179. http://online.securityfocus.com/archive/1/264590
 180. http://www.pivx.com/larholm/unpatched/archivednews.html#patch_MS03_015
 181. http://msgs.securepoint.com/cgi-bin/get/bugtraq0211/255.html
 182. http://lsd-pl.net/java_security.html
 183.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_011
 184. http://msgs.securepoint.com/cgi-bin/get/bugtraq0212/218.html
 185. http://www16.brinkster.com/liudieyu/viaSWFurl/viaSWFurl-MyPage.htm
 186.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_015
 187. http://msgs.securepoint.com/cgi-bin/get/bugtraq0212/29.html
 188. http://jscript.dk/2002/11/sec/diemodalstyleXSS.html
 189.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_015
 190. http://www.malware.com/stench.html
 191. http://www.malware.com/malware.php
 192.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_015
 193. http://security.greymagic.com/adv/gm004-ie/
 194. http://security.greymagic.com/adv/gm004-ie/
 195.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_015
 196. http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/49.html
 197. http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/78.html
 198.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_020
 199. http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/130.html
 200. http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/147.html
 201. http://www.malware.com/forceframe.html
 202.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_020
 203. http://msgs.securepoint.com/cgi-bin/get/bugtraq0305/85.html
 204.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_020
 205. http://msgs.securepoint.com/cgi-bin/get/bugtraq0306/170.html
 206.
file://localhost/home/raymond/Raymond/old/home/raymond/pivxhack.html#patch_MS03_023
 207. http://www.microsoft.com/technet/security/bulletin/MS02-008.asp
 208. http://microsoft.com/technet/security/bulletin/MS02-044.asp
 209. http://microsoft.com/windows/ie/downloads/critical/ie6sp1/
 210. http://www.microsoft.com/WindowsXP/pro/downloads/servicepacks/sp1/
 211. http://microsoft.com/technet/security/bulletin/MS02-050.asp
 212. http://www.microsoft.com/technet/security/bulletin/MS03-011.asp
 213. http://www.microsoft.com/technet/security/bulletin/MS03-020.asp
 214. http://www.microsoft.com/technet/security/bulletin/MS03-032.asp
 215. http://www.microsoft.com/technet/security/bulletin/MS03-023.asp
 216. mailto:thor@...x.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ