Full Disclosure mailing list archives
Re: MS04-028 Shell Exploit
From: "Mailing Lists" <mlist () iwasdot com>
Date: Wed, 22 Sep 2004 20:31:37 -0400 (EDT)
Does anyone know the order of displaying images and saving them to cache? I tested the cmd.exe jpg and it is detected by McAfee as Exploit MS04-028. So does internet explorer write the image to cache first before it displays it or does it display the image then write it to cache. I don't have a machine with web server installed where I could test this at the moment. My concern is that internet explorer will open the file and execute the exploit before the code hits the hard disk. We will know that a machine has been expoited but that may be to late. Thanks
Well, on my WinXP SP1 machine, the shellcode will not excecute when displayed in a web browser (firefox PR1 and IE 6 SP1). It will however excecute when windows opens the folder that it's in (trying to make a thumbnail i would assume.) A few seconds after the command window opens, explorer crashes. (un)Fortunately none of the email accounts that I had up and running let the attatchment through... they thought it was Bloodhound.Exploit.13. I didn't have enough time to try anything fancy immediately before i left work so I left it at that. I wonder if this could potentially turn into an email worm. -andy Todd Towles wrote:MS04-028 Exploit Launches local cmd.exe (not port bound) http://www.k-otik.com/exploits/09222004.ms04-28-cmd.c.php -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com] On Behalf Of Josh L. Perrymon Sent: Wednesday, September 22, 2004 1:48 PM To: full-disclosure () lists netsys com Subject: [Full-disclosure] New GDI exploit Game over... So the exploit is out that will open a local command prompt on the machine exploiting the GDI library.. This thing allows 2500 bytes of shellcode.. How long before this turns nasty? Seems easy to me to make it reverse shell... -------- The problem I have is patching with SMS. MBSA won't pickup the needed patched in SMS so you have to push out to all machines in a container for a certain software type- IE XP VIsio blah blah so on.... ------------ The cycle continues.. JP _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- RE: MS04-028 Shell Exploit Todd Towles (Sep 22)
- Re: MS04-028 Shell Exploit Andy Silva (Sep 22)
- Re: MS04-028 Shell Exploit Mailing Lists (Sep 22)
- Re: MS04-028 Shell Exploit Andy Silva (Sep 23)
- Re: MS04-028 Shell Exploit[Scanned] Andy Silva (Sep 23)
- Re: MS04-028 Shell Exploit Andy Silva (Sep 22)