Vulnerability Development mailing list archives

Re: Outlook/HTML "proggie"


From: ecchien () JPS NET (Eric Chien)
Date: Fri, 2 Jun 2000 10:10:12 +0200


Hello,

It is amazing sometimes how much bandwidth someone can get and how much is
wasted.  Very old news and patched months ago by Microsoft.
http://www.microsoft.com/technet/security/bulletin/ms99-032.asp

...Eric

At 11:33 PM 6/1/2000 +0300, methodman wrote:
      well... since everybody is so interested in what the SCR  object is,
i'm going to tell you... it is an activex control with the classID:
06290BD5-48AA-11D2-8432-006008C3FBFC , it's name is actually gave it the id
SCR). WSH has the  classID  called "Windows Scripting Host Shell  Object",
(Wscript.SHell - therefore i gave it the id WSH). about badblood... i
didn't even hear about it until  Thierry said it exists, same goes for the
code written by Exxtreme. about the source code... if you are reading this
through outlook check "thisreallyworks.txt" on your desktop :)). -- this
only works if the security level is not set  to "restriced sites zone"
[ methodman ]


Current thread: