Home page logo

bugtraq logo Bugtraq mailing list archives

RE: [Fwd: Re: AIM Password theft] VU#865940
From: "Thor Larholm" <thor () pivx com>
Date: Wed, 24 Sep 2003 13:20:57 -0700

You are correct, I should not have replied to Mark when I had not yet had my morning coffee. The dynamic rendering of 
OBJECT elements still trigger the HTA functionality exposed in Windows. Personally, though, I see this as an unrelated 
vulnerability regarding static/dynamic code rendering which has a greater impact than just allowing HTA code to execute.
Both GM#001 and thePulls POC, which malware cites, are one and the same issue instead of two separate, they both 
trigger the dynamic rendering of HTML instead of the static - GM#001 just does this without requiring scripting.
Thor Larholm
PivX Solutions, LLC - Senior Security Researcher
http://www.pivx.com/larholm/unpatched - Unpatched IE vulnerabilities

        -----Original Message----- 
        From: CERT(R) Coordination Center [mailto:cert () cert org] 
        Sent: Wed 9/24/2003 11:35 AM 
        To: Thor Larholm 
        Cc: CERT(R) Coordination Center; Mark Coleman; bugtraq () securityfocus org 
        Subject: RE: [Fwd: Re: AIM Password theft] VU#865940

        At the present, the patch for MS03-032 breaks one of at least three
        exploit techniques.  The patch does not resolve the vulnerability.
        MS03-032 acknowledges this.  I have seen several examples of this
        vulnerability being exploited in the wild.
        In particular, the current MS03-32 patch doesn't account for an HTML
        document created via XML/data binding:
        The patch also does not account for an HTML document created via
                     Art Manion  --  CERT Coordination Center

  By Date           By Thread  

Current thread:
  • RE: [Fwd: Re: AIM Password theft] VU#865940 Thor Larholm (Sep 24)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]