exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ieBad.txt

ieBad.txt
Posted Mar 31, 2004
Site malware.com

Good write up discussing how Microsoft has yet again dropped the ball on patching another Internet Explorer vulnerability, where using forms can allow an attacker to spoof a fake destination to the user.

tags | exploit, spoof
SHA-256 | 518c6b718d88df9d2c880d83b2441bc75030395324543fe528bc4edcbeffb0c0

ieBad.txt

Change Mirror Download


Wednesday, March 31, 2004

This is somewhat disconcerting. Reference the recently disclosed
Internet Explorer 'bug' presently in the wild [original
discussion: http://www.securityfocus.com/archive/1/358813 with
additional input buried thereunder in subsequent threads]
allowing for complete remote compromise of the client machine
without any user interaction other than viewing a webpage,
through yet again, the Microsoft Internet Explorer browser.

A lot of 'chatter' or very bold claims 'having been the first to
see this and analyse it' seem to have appeared recently that
would make this particular bug well known for at least 6 weeks
now. We must assume that these claimants had immediately
notified the manufacturer of this particular device that allows
for all of this immediately back then. Accordingly 6 weeks have
transpired and to date all users of this particular merchant's
product remain vulnerable.

It still remains "unpatched".

Perhaps to speed things up, the introduction of the Outlook
Express email client from the same merchant might be necessary:

Commence:

Outlook Express number 6 has fairly stringent security settings
in default mode, most notable, setting all actions in the so-
called 'restricted zone'. This disallows such things as frames,
scripting, objects etc.

However it does allow from one interesting piece of html

Forms:

<A
href="http://www.microsoft.com">
<FORM action=http://www.malware.com/t-bill.html method=get>
<INPUT style="BORDER-RIGHT: 0pt;
BORDER-TOP: 0pt; FONT-SIZE: 10pt; BORDER-LEFT: 0pt; CURSOR:
hand; COLOR:
blue; BORDER-BOTTOM: 0pt; BACKGROUND-COLOR: transparent;
TEXT-DECORATION: underline" type=submit
value=http://www.microsoft.com>
</A>

What is of particular interest is that if we encase our html
form with a run-of-the-mill 'link', we are able to spoof in our
status bar our true destination:

[screen shot: http://www.malware.com/not-good.png 24KB]

as well as re-style our form to suit our needs.

What we then do is construct our original functional demo to:

a) redirect immediately on loading to the 'suggested' address;
that is http://www.microsoft.com
b) at that instance [prior], drop our malware.exe into our
startup folder for execution the next day

while the recipient is blissfully unaware viewing the site as
indicated.

Fully Functional Harmless Demo:

http://www.malware.com/not-so-good.zip

note: regardless of where this is viewed, it is governed by
the 'restricted zone' at all times

In this particular demo, we drop malware.exe into C: trivial
tweaking via shell or full path places it wherever we like. This
fully functional demo is heavily diluted. Practical
implementation requires minor modifications on the
transmitting client side. This demo will be flagged by AV suites
owing to past usage and recognisable code.


End Call


--
http://www.malware.com



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close