Re: [Full-disclosure] Binary Planting Goes "Any File Type"
And here's where your exploit stops being one:
=3D=3D=3D
Suppose the current version of Apple Safari (5.0.5) is our default web
browser.=A0If we put the above files in the same directory (on a local
drive or a remote share) and double-click=A0Test.html, what happens is
the following:
=3D=3D=3D
At this point, Test.html might actually be test.exe with the HTML icon
embedded. Everything else then is unnecessary obfuscation -- code
execution was already possible the start by design.
This is a neat vector though, and it's likely that with a bit more
work it could be turned into an actual RCE.
On Fri, Jul 8, 2011 at 10:38 AM, ACROS Security Lists <lists@acros.si> wrot=
e:
>
> We published a blog post on a nice twist to binary planting which we call=
"File
> Planting." There'll be much more of this from us in the future, but here'=
s the first
> sample for you to (hopefully) enjoy.
>
> http://blog.acrossecurity.com/2011/07/binary-planting-goes-any-file-type.=
html
>
> or
>
> http://bit.ly/nXmRFD
>
>
> Best regards,
>
> Mitja Kolsek
> CEO&CTO
>
> ACROS, d.o.o.
> Makedonska ulica 113
> SI - 2000 Maribor, Slovenia
> tel: +386 2 3000 280
> fax: +386 2 3000 282
> web: http://www.acrossecurity.com
> blg: http://blog.acrossecurity.com
>
> ACROS Security: Finding Your Digital Vulnerabilities Before Others Do
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
討論串 (同標題文章)
完整討論串 (本文為第 2 之 3 篇):