[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow
- To: "'Alexander Sotirov'" <asotirov@xxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow
- From: "George Ou" <george_ou@xxxxxxxxxxxxxxxx>
- Date: Mon, 2 Apr 2007 19:35:27 -0700
Ok thanks. I guess we need to add "steal data" to the list of things an
exploited IE7 session in Vista can do. I never got to test that far because
DEP nuked my browser session.
George
-----Original Message-----
From: Alexander Sotirov [mailto:asotirov@xxxxxxxxxxxxx]
Sent: Monday, April 02, 2007 7:14 PM
To: George Ou
Cc: full-disclosure@xxxxxxxxxxxxxxxxx
Subject: Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow
George Ou wrote:
> The exploited instance of IE7 probably spawns cmd.exe with the same
> privilege levels as IE7 in Protected Mode, which means you don't have
> read/write access to the user or system files. It's still bad because you
> probably get to harvest all of the saved username/passwords in the browser
> and capture all input/output from that IE session.
>
> Now in the case of an exploited Firefox 2, you have full read/write
> permissions to all of the user files which means you get to steal all the
> user files and/or encrypt them for ransom.
Protected Mode only blocks write access. IE can write only to a few
locations on
the system, but it still has full read access to all files readable by the
user.
See
http://msdn.microsoft.com/library/en-us/IETechCol/dnwebgen/ProtectedMode.asp
and slides 41-53 in
http://download.microsoft.com/download/0/1/3/01381C25-72DA-4AA9-B792-43E02A2
43C71/SEC403_Riley.ppt
Alex
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/