[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTin4Rt0mwSvv6GQKLb-_SxhR2EdYykkYpQZShCYK@mail.gmail.com>
Date: Sat, 4 Sep 2010 12:16:06 +0800
From: YGN Ethical Hacker Group <lists@...g.net>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
bugs@...uritytracker.com, vuln@...unia.com, secalert@...urityreason.com,
news@...uriteam.com, vuln@...urity.nnov.ru
Cc: Peter Van Eeckhoutte <peter.ve@...elan.be>
Subject: Microsoft Internet explorer 8 DLL Hijacking
(IESHIMS.DLL)
I found this Microsoft Internet explorer 8 DLL Hijacking at Inject0r db
http://inj3ct0r.com/exploits/13898
This one is a similar variant of IE 7
http://www.exploit-db.com/exploits/2929/
It can be triggered only if attackers can put a IESHIMS.DLL file in
user's desktop.
However, there are some supporting factors that trigger this exploit successful
such as when user's default download location is Desktop
Ref:
http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists