Re: [Full-disclosure] Binary Planting Goes "Any File Type"

看板Bugtraq作者時間14年前 (2011/07/12 05:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/3 (看更多)
Ok, Dan, just for you: Launch Internet Explorer 9 on Windows 7 (probably other IE/Win works too), g= o to File->Open (or press Ctrl+O), browse to Test.html and open it. No doubl= e-clicking and you couldn't launch an executable this way. Better? Cheers, Mitja On Jul 8, 2011, at 9:10 PM, Dan Kaminsky <dan@doxpara.com> wrote: > And here's where your exploit stops being one: >=20 > =3D=3D=3D > Suppose the current version of Apple Safari (5.0.5) is our default web > browser. If we put the above files in the same directory (on a local > drive or a remote share) and double-click Test.html, what happens is > the following: > =3D=3D=3D >=20 > At this point, Test.html might actually be test.exe with the HTML icon > embedded. Everything else then is unnecessary obfuscation -- code > execution was already possible the start by design. >=20 > This is a neat vector though, and it's likely that with a bit more > work it could be turned into an actual RCE. >=20 > On Fri, Jul 8, 2011 at 10:38 AM, ACROS Security Lists <lists@acros.si> wro= te: >>=20 >> We published a blog post on a nice twist to binary planting which we call= "File >> Planting." There'll be much more of this from us in the future, but here'= s the first >> sample for you to (hopefully) enjoy. >>=20 >> http://blog.acrossecurity.com/2011/07/binary-planting-goes-any-file-type.= html >>=20 >> or >>=20 >> http://bit.ly/nXmRFD >>=20 >>=20 >> Best regards, >>=20 >> Mitja Kolsek >> CEO&CTO >>=20 >> ACROS, d.o.o. >> Makedonska ulica 113 >> SI - 2000 Maribor, Slovenia >> tel: +386 2 3000 280 >> fax: +386 2 3000 282 >> web: http://www.acrossecurity.com >> blg: http://blog.acrossecurity.com >>=20 >> ACROS Security: Finding Your Digital Vulnerabilities Before Others Do >>=20 >>=20 >> _______________________________________________ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >=20
文章代碼(AID): #1E6sIF8G (Bugtraq)
文章代碼(AID): #1E6sIF8G (Bugtraq)