Re: Re[2]: 0day: mIRC pwns Windows

看板Bugtraq作者時間18年前 (2007/10/05 03:08), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
Windows is doing the URI handling, not mIRC. This example can be just as easily duplicated by entering http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat into the start->run dialog. http://www.kb.cert.org/vuls/id/403150 this is not a mIRC bug. On 10/4/07, 3APA3A <3APA3A@security.nnov.ru> wrote: > Dear Gavin Hanover, > > In this very case it's really seems to be mIRC problem ("unfiltered > shell characters"). It doesn't depend on URL handler and will work with > any valid URL handler. You can reproduce same vulnerability by entering > > http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat > > Exploitable under Windows XP, not exploitable under Vista. > > --Wednesday, October 3, 2007, 11:59:45 PM, you wrote to jinc4fareijj@hotmail.com: > > GH> is this a mirc bug or a mail client bug? > > >> mailto:%xx../../../../../../../../../../../windows/system32/calc.exe".bat > >> > > -- > ~/ZARAZA http://securityvulns.com/ > > > -- In God we trust, Everyone else must have an x.509 certificate.
文章代碼(AID): #171Jen00 (Bugtraq)
文章代碼(AID): #171Jen00 (Bugtraq)