Full Disclosure mailing list archives
Re: another filename bypass vulnerability - from cmd.exe
From: Peter Ferrie <pferrie () symantec com>
Date: Thu, 17 Nov 2005 11:58:46 -0800
Was doing some testing [xfocus-AD-051115]
The system is windows 2000 sp4 srp5 with
all other patches upto date.
At the command prompt cmd.exe execute
the following with the results.
E:\TEMP>cd test
E:\TEMP\test>copy %windir%\system32\calc.exe
1 file(s) copied.
E:\TEMP\test>ren calc.exe calc.exe.zip
E:\TEMP\test>dir /b
calc.exe.zip
E:\TEMP\test>calc.exe.zip
E:\TEMP\test>
-------------------------------------------------------------------
This bring up the calc.exe on the screen.
But this is old and well-known. Any file can be executed from the command-line by supplying the full name+extension. It has been so since Windows NT was released. Windows opens the file, and if Windows sees that it's a Windows executable, Windows runs it. However, it's not limited to executable files. Create a text file, name it "blah.txt", then type "blah.txt" and Notepad will open it. In that case, Windows sees that it's not a Windows file, and checks the registry for a handler. 8^) p. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: another filename bypass vulnerability - from cmd.exe Peter Ferrie (Nov 17)
- Re: another filename bypass vulnerability - from cmd.exe HernĂ¡n M . Racciatti (Nov 17)
- Re: another filename bypass vulnerability - from cmd.exe Valdis . Kletnieks (Nov 17)
- Re: another filename bypass vulnerability - fromcmd.exe Morning Wood (Nov 17)
- Re[2]: another filename bypass vulnerability - fromcmd.exe Thierry Zoller (Nov 17)
- Re: another filename bypass vulnerability - from cmd.exe HernĂ¡n M . Racciatti (Nov 17)
