Full Disclosure mailing list archives
RE: FW: [Fwd: Re: AIM Password theft]
From: "Thor Larholm" <thor () pivx com>
Date: Wed, 24 Sep 2003 13:29:39 -0700
Mark, You are correct, I should not have replied to Mark when I had not yet had my morning coffee. The dynamic rendering of OBJECT elements still trigger the HTA functionality exposed in Windows. Personally, though, I see this as an unrelated vulnerability regarding static/dynamic code rendering which has a greater impact than just allowing HTA code to execute. Both GM#001 and thePulls POC, which malware cites, are one and the same issue instead of two separate, they both trigger the dynamic rendering of HTML instead of the static - GM#001 just does this without requiring scripting. Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher http://www.pivx.com/larholm/unpatched - Unpatched IE vulnerabilities -----Original Message----- From: Bassett, Mark [mailto:mbassett () omaha com] Sent: Wed 9/24/2003 7:57 AM To: Thor Larholm; NTBugtraq; full-disclosure () lists netsys com; list () dshield org Cc: Subject: RE: [Full-disclosure] FW: [Fwd: Re: AIM Password theft] Actually the MS03-032 patch doesn't stop the object data vulnerability. Check it here... http://www.secunia.com/MS03-032/ I am patched with MS03-032 ( Q822925 ) but am still vulnerable. Possibly the particular version at haxr.org is the exploit that the patch fixes but if it is, it could easily be modified to the vuln that still works. Only way to really stop it is kill your activex scripting for untrusted sites. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- FW: [Fwd: Re: AIM Password theft] Thor Larholm (Sep 23)
- Re: FW: [Fwd: Re: AIM Password theft] w g (Sep 23)
- <Possible follow-ups>
- RE: FW: [Fwd: Re: AIM Password theft] Bassett, Mark (Sep 24)
- Re: FW: [Fwd: Re: AIM Password theft] Valdis . Kletnieks (Sep 24)
- RE: FW: [Fwd: Re: AIM Password theft] Thor Larholm (Sep 24)