BugTraq
Back to list
|
Post reply
Re: .MHT Buffer Overflow in Internet Explorer
Mar 11 2003 05:13PM
http-equiv (at) excite (dot) com [email concealed] (http-equiv malware com)
<!--
The following sample format contains malformed MIME header along with
the Base64 encoded executable.
----------------------------------------------
MIME-Version: 1.0
------=_NextPart_000_0000_01C2E1F4.0D559EA0
Content-Location:file:///tomatell.exe
Content-Transfer-Encoding: base64
TVpQ
----------------------------------------------
-->
Excellent!
Yes, there has always been something suspicious about that spot.
Simply writing the word [header] GIF89a in the same spot will create
an empty image container:
------phuquedup.mhtml-----
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
GIF89a
------phuquedup.mhtml-----
End Call
--
http://www.malware.com
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
<!--
The following sample format contains malformed MIME header along with
the Base64 encoded executable.
----------------------------------------------
MIME-Version: 1.0
------=_NextPart_000_0000_01C2E1F4.0D559EA0
Content-Location:file:///tomatell.exe
Content-Transfer-Encoding: base64
TVpQ
----------------------------------------------
-->
Excellent!
Yes, there has always been something suspicious about that spot.
Simply writing the word [header] GIF89a in the same spot will create
an empty image container:
------phuquedup.mhtml-----
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
GIF89a
------phuquedup.mhtml-----
End Call
--
http://www.malware.com
[ reply ]