[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY117-W1842431D860CA7B115B3A7C2DE0@phx.gbl>
Date: Wed, 15 Aug 2007 18:43:53 +0000
From: Jimby Sharp <jimbysharp@...mail.com>
To: Aditya K Sood <zeroknock@...niche.org>, Debasis Mohanty
<debasis.mohanty.listmails@...il.com>,
<full-disclosure@...ts.grok.org.uk>,
<bugtraq@...urityfocus.com>, <websecurity@...appsec.org>, "Steven M.
Christey" <coley@...re.org>
Subject: Re: SecNiche : Microsoft Internet Explorer Pop up
Blocker Bypassing and Dos Vulner
I wonder why we can't find Aditya K Sood in any of the security list even though he has made so many public disclosures.
See:-
http://www.google.com/search?hl=en&q=site%3Asecunia.com+aditya+sood
http://www.google.com/search?hl=en&q=site%3Aosvdb.org+aditya+sood
Is it because these lists dislike Aditya or is it because they find the vulnerabilities to be false while verification?
AFAIK OSVDB has a system of tagging vulnerabilities as Myth/Fake. I wonder why the disclosures published by Aditya are missing in OSVDB. OSVDB should add these vulnerabilities and properly classify them or tag them as fake. Anyone from OSVDB here who can respond?
- JS
----------------------------------------
> Date: Thu, 16 Aug 2007 22:59:14 -0700
> From: zeroknock@...niche.org
> To: debasis.mohanty.listmails@...il.com; full-disclosure@...ts.grok.org.uk; bugtraq@...urityfocus.com; websecurity@...appsec.org; coley@...re.org
> Subject: Re: [Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability
>
> Debasis Mohanty wrote:
> > No offence intended but if you take a little more effort of validating your
> > work before posting publicly then you can save yourself from embarrassment.
> >
> > I don't see anything in the script that can bypass zone security and run
> > successfully from internet zone. I am sure you have tested it locally and
> > drawn conclusion that the script can execute from internet zone. To test the
> > script from internet zone, you need to upload it to a webserver and try
> > accessing via browser.
> >
> > Any VB/Java script will run from local security with a charm but if you can
> > make it run from internet zone (without a prompt) then you found a holy
> > grail. However I don't see anything in the script which can defeat zone
> > security and access registry, hence no vulnerability.
> >
> > The best way to validate your work before posting publicly is, run it
> > through the vendor or third party security sites like secunia or idefence.
> > This would certainly save you from public embarrassment.
> >
> >
> > -d
> >
> >
> >
> > -----Original Message-----
> > From: full-disclosure-bounces@...ts.grok.org.uk
> > [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Aditya K
> > Sood
> > Sent: 17 August 2007 09:07
> > To: full-disclosure@...ts.grok.org.uk; bugtraq@...urityfocus.com;
> > websecurity@...appsec.org; Steven M. Christey
> > Subject: [Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up
> > Blocker Bypassing and Dos Vulnerability
> >
> > Advisory : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos
> > Vulnerability
> >
> > Dated : 15 August 2007
> >
> > Severity : Critical
> >
> > Explanation :
> >
> > The vulnerability persists in the popup blocker functioning to allow
> > specific websites to execute
> > popup in the running instance of Internet Explorer. An attacker can
> > easily exploits it by enabling
> > a browser to run a malicious script in the context of Internet Explorer.
> > The script manipulates the
> > registry entries for specific websites through Javascript. It adds fake
> > or malicious websites as an
> > allowed websites in the pop up blocker. The cause user visiting a
> > untrusted website or any othe
> > malicious cause.
> >
> > Detail Advisory :
> > http://www.secniche.org/advisory/Internet_Pop_Phish_Dos_Adv.pdf
> > http://www.secniche.org/adv.html
> >
> >
> > Proof of Concept : Level 1 Infection Test
> > http://www.secniche.org/misc/ie_pop_by_level1_test.zip
> >
> > Test run fine locally as well with Web server [IIS] automated server
> > object calling. Infection
> > through Active X Object.
> >
> > Regards
> > AKS aka 0kn0ck
> > http://www.secniche.org
> >
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
> >
> Hi
>
> "
>
> /Any VB/Java script will run from local security with a charm but if you can
> make it run from internet zone (without a prompt) then you found a holy
> grail. However I don't see anything in the script which can defeat zone
> security and access registry, hence no vulnerability./
>
> "
> No problem. I think every script that runs from the
> Internet zone prompts.Mr. Debasish.
> Most of the time locally it prompts too. I hope you can find any method
> that an active X control
> does not prompt. You are good at bypassing things.
>
> /"I don't see anything in the script that can bypass zone security and run
> successfully from internet zone. I am sure you have tested it locally and
> drawn conclusion that the script can execute from internet zone. To test the
> script from internet zone, you need to upload it to a webserver and try
> accessing via browser. "
> /
> I think I have told the practical citation clearly. The automation object
> is required.
>
> "
> The best way to validate your work before posting publicly is, run it
> through the vendor or third party security sites like secunia or idefence.
> This would certainly save you from public embarrassment. "
>
> Embarrassment. Nothing lies beneath it. Critically your are too much at
> of your own in deciding.
>
> Regards
> AKS
>
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_________________________________________________________________
Make every IM count. Download Windows Live Messenger and join the i’m Initiative now. It’s free.
http://im.live.com/messenger/im/home/?source=TAGWL_June07
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists