lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <019001c4950d$b95586c0$4a00030a@netvision.ads> From: mikx at mikx.de (mikx) Subject: Virus loading through ActiveX-Exploit [Fwd: George Bush sniper-rifle shot!] > "Alla Bezroutchko" wrote: > Also interesting that they don't use > "a {behavior:url(#default#AnchorClick);}" > in this exploit which seems to be an essential part of http-equiv's and > mikx's exploits. The key to all this exploits is drag'n'drop access to a local directory. Since WinXP SP2 it's not possible to use "shell:startup" as src for an iframe, but it's possible to circumvent this restriction by using the AnchorClick behavior. mikx