[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part IV
- To: "morning_wood" <se_cur_ity@hotmail.com>, "Jelmer Kuperus" <jkuperus@planet.nl>
- Subject: Re: [Full-Disclosure] Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part IV
- From: "Thor Larholm" <thor@pivx.com>
- Date: Fri, 2 Jan 2004 19:14:46 -0800
> From: "morning_wood" <se_cur_ity@hotmail.com>
> running "malware.html" locally does produce the desired results, but then
> again...
The exploit is intended and created to be run locally from a local security
zone - getting to a local zone in the first place requires other
vulnerabilities.
> i can get any html to execute locally calling a remote location for the
code, as
> long as its run from the local machine.
There are several steps involved in most of all IE command execution
exploits, some of these involve downloading and executing a file once you
are already in a local security zone. What http-equiv did was to simplify
that part of the process by using the Shell.Application object.
Regards
Thor Larholm
Senior Security Researcher
PivX Solutions
24 Corporate Plaza #180
Newport Beach, CA 92660
http://www.pivx.com
thor@pivx.com
949-231-8496
PivX defines "Proactive Threat Mitigation". Get a FREE Beta Version of
Qwik-Fix
<http://www.qwik-fix.net>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html