Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

What about M$ in the shell: race
From: "Perrymon, Josh L." <PerrymonJ () bek com>
Date: Fri, 9 Jul 2004 10:31:15 -0500

http://www.packetfocus.com/shell_exploit.htm

IE will execute the shell: command locally but prompts the user to open /
save the file if used with an anchor.
But what is this was used with another IE exploit that may not have system
privs but ran shell: locally-

wouldn't that have system privs then or would that run under the browser?

Interesting so far-

Hopefully this will help the effort to promote open source standards to move
away from M$ web monopoly.
Until then I will just uses BBS's-- hehehehehehe

Anyone up for a good game of Tradewars ;)

Joshua Perrymon
Sr. Network Security Consultant

PGP Fingerprint
51B8 01AC E58B 9BFE D57D  8EF6 C0B2 DECF EC20 6021

**********CONFIDENTIALITY NOTICE**********
The information contained in this e-mail may be proprietary and/or 
privileged and is intended for the sole use of the individual or 
organization named above.  If you are not the intended recipient or an 
authorized representative of the intended recipient, any review, copying
or distribution of this e-mail and its attachments, if any, is prohibited.
If you have received this e-mail in error, please notify the sender
immediately by return e-mail and delete this message from your system.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault