[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <82CB183EE984504CB89566128AEE6FD9343BDE@is6b>
From: PerrymonJ at bek.com (Perrymon, Josh L.)
Subject: What about M$ in the shell: race
http://www.packetfocus.com/shell_exploit.htm
IE will execute the shell: command locally but prompts the user to open /
save the file if used with an anchor.
But what is this was used with another IE exploit that may not have system
privs but ran shell: locally-
wouldn't that have system privs then or would that run under the browser?
Interesting so far-
Hopefully this will help the effort to promote open source standards to move
away from M$ web monopoly.
Until then I will just uses BBS's-- hehehehehehe
Anyone up for a good game of Tradewars ;)
Joshua Perrymon
Sr. Network Security Consultant
PGP Fingerprint
51B8 01AC E58B 9BFE D57D 8EF6 C0B2 DECF EC20 6021
**********CONFIDENTIALITY NOTICE**********
The information contained in this e-mail may be proprietary and/or
privileged and is intended for the sole use of the individual or
organization named above. If you are not the intended recipient or an
authorized representative of the intended recipient, any review, copying
or distribution of this e-mail and its attachments, if any, is prohibited.
If you have received this e-mail in error, please notify the sender
immediately by return e-mail and delete this message from your system.
Powered by blists - more mailing lists