Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: .MHT Buffer Overflow in Internet Explorer
From: "http-equiv () excite com" <http-equiv () malware com>
Date: Tue, 11 Mar 2003 17:13:21 -0000



<!-- 
The following sample format contains malformed MIME header along with 
the Base64 encoded executable. 

---------------------------------------------- 
MIME-Version: 1.0 
------=_NextPart_000_0000_01C2E1F4.0D559EA0 
Content-Location:file:///tomatell.exe 
Content-Transfer-Encoding: base64 


TVpQ 
---------------------------------------------- 


 -->

Excellent!

Yes, there has always been something suspicious about that spot. 
Simply writing the word [header] GIF89a in the same spot will create 
an empty image container:

------phuquedup.mhtml-----

MIME-Version: 1.0 
Content-Transfer-Encoding: 7bit 

GIF89a

------phuquedup.mhtml-----



End Call

-- 
http://www.malware.com









  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]