lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 27 Oct 2017 15:01:32 +0000
From: "Stevie Lamb (WLT GB)" <>
To: "" <>
Subject: [FD] Windows Attachment Manager *potential* feature bypass

*First ever post, so apologies for any associated naiveté*



The Windows Attachment Manager does not correctly handle JAR files marked as
“high risk” when accessed via Internet Explorer 11.

This leads to direct execution of any JAR file when a user clicks “Open”
rather than “Save” or “Save as”, when the expected behaviour would be a nag


Other files added to the same “high risk” category behave as expected,
regardless of whether they are directly launched or first saved.

Currently neither Chrome, Edge nor Firefox browsers provide an “Open” option
for such files, and so are unaffected.


With some social engineering this behaviour may be exploited to gain code
execution at the privilege level of the affected user.

This is most likely to be successful when the user has been conditioned to
expect warnings from the Attachment Manager about potentially unsafe files.


MS Security decided this wasn’t a security issue – and by their published
definitions I accept that assertion.

But sharing’s caring, this issue can and therefore probably will be abused,
if it hasn’t already.


To reproduce:


Client OS – Windows 10 Pro (version 10.0.14393)

Browser – IE11 (version 11.00.14393.0) *supplied with OS for backwards


Sample Attachment Manager configuration



Attribute : Value

Trust logic for file attachments


Determine risk by : Preferring the file handler

Default risk level for file attachments


Set the default risk level : High risk

Inclusion list for high-risk file types



Inclusion list for low file types



Inclusion list for moderate risk file types




1.       Download any JAR file using the built-in IE11 (x64 or x86) and opt
to open it.

2.       The file opens without any nag dialog indicating the file type is
potentially harmful.


Hope it’s useful.


Kind regards,



Download attachment "smime.p7s" of type "application/pkcs7-signature" (11464 bytes)

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists