Bugtraq mailing list archives
Re: .MHT Buffer Overflow in Internet Explorer
From: "http-equiv () excite com" <http-equiv () malware com>
Date: Tue, 11 Mar 2003 17:13:21 -0000
<!-- The following sample format contains malformed MIME header along with the Base64 encoded executable. ---------------------------------------------- MIME-Version: 1.0 ------=_NextPart_000_0000_01C2E1F4.0D559EA0 Content-Location:file:///tomatell.exe Content-Transfer-Encoding: base64 TVpQ ---------------------------------------------- --> Excellent! Yes, there has always been something suspicious about that spot. Simply writing the word [header] GIF89a in the same spot will create an empty image container: ------phuquedup.mhtml----- MIME-Version: 1.0 Content-Transfer-Encoding: 7bit GIF89a ------phuquedup.mhtml----- End Call -- http://www.malware.com
Current thread:
- .MHT Buffer Overflow in Internet Explorer Tom Tanaka (Mar 11)
- Re: .MHT Buffer Overflow in Internet Explorer jelmer (Mar 11)
- Re: .MHT Buffer Overflow in Internet Explorer Thor Larholm (Mar 12)
- Re: .MHT Buffer Overflow in Internet Explorer Jouko Pynnonen (Mar 11)
- <Possible follow-ups>
- Re: .MHT Buffer Overflow in Internet Explorer http-equiv () excite com (Mar 11)
- Re: .MHT Buffer Overflow in Internet Explorer jelmer (Mar 11)