BugTraq
RE: Internet Explorer URL parsing vulnerability Dec 09 2003 11:51PM
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Here's a fully functional self-explanatory demo:

http://www.malware.com/hole-e-day.zip

functional from these quarters on fully patched IE6 / OE6

No doubt many will receive nice holiday greetings soon enough

END CALL

The following works on Outlook Express 6 latest everything. Running
on XP.

http://cert.uni-stuttgart.de/archive/bugtraq/2003/07/msg00249.html

09% pushes malware.com out of sight in the task bar, and %01 leaves
microsoft.com intact in the address bar:

<A
href="http://www.microsoft.com%01%09%09%09%09%09%09%
09 (at) www.malware (dot) com [email concealed]">religious
software</A>

Certainly will add a new flavour to the ever increasing methods of
trickery. Now all we need to do is spoof the file download name on
an *.exe and away we go.

--
http://www.malware.com

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus