Home page logo

bugtraq logo Bugtraq mailing list archives

IE and Outlook 5.x allow executing arbitrary programs using .eml files
From: joro () NAT BG (Georgi Guninski)
Date: Tue, 14 Mar 2000 16:01:26 +0200

Georgi Guninski security advisory #9, 2000

IE and Outlook 5.x allow executing arbitrary programs using .eml files

The opinions expressed in this advisory and program are my own and not
of any company.
The usual standard disclaimer applies, especially the fact that Georgi
Guninski is not liable for any damages caused by direct or  indirect use
of the information or functionality provided by this program.
Georgi Guninski, bears NO responsibility for content or misuse of this
program or any derivatives thereof.

There is a vulnerability in IE and Outlook 5.x for Win9x/WinNT (probably
others) which allows executing arbitrary programs using .eml files.
This may be exploited when browsing web pages or openining an email
message in Outlook.
This may lead to taking control over user's computer.
It is also possible to read and send local files.

The problem is creating files in the TEMP directory with known name and
arbitrary content.
One may place a .chm file in the TEMP directory which contains the
"shortcut" command and when the .chm file is opened with the showHelp()
method programs may be executed.
This vulnerability may be exploited by HTML email message in Outlook.

The code that must be included in a .eml file is:
<IFRAME align=3Dbaseline alt=3D"" =
border=3D0 hspace=3D0=20
Content-Type: application/binary;
Content-Transfer-Encoding: base64
Content-ID: <000701bf8458$eb570380$dc0732d4 () bbb>

...Put the base64 encoded .chm file here...

Demonstration which starts Wordpad:

Workaround: Disable Active Scripting.

Copyright 2000 Georgi Guninski

Georgi Guninski

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]