what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

malware.txt

malware.txt
Posted Jul 24, 2003
Site malware.com

Post discussing vulnerabilities in deployment of dangerous files onto a target machine utilizing the Windows Media Player.

tags | advisory, vulnerability
systems | windows
SHA-256 | 8f316501a1dad19f5066131347357a6b5fef2a66474c18543f7935f8ac377235

malware.txt

Change Mirror Download


Wednesday, 23 July, 2003

Yet another quaint lead-up to "silent delivery and installation of an
executable on a target computer. No client input other than viewing a
web page" !

This is getting boring.

A myriad of technical hurdles have been recently placed to disallow
access to files and folders on the local machine from the internet.
Previously simple redirects could defeat that, but that too has been
eliminated.

Coupled with a myriad of existing possibilities of placing arbitrary
files in known locations on the local machine, along with perhaps
several other well known applications that create sensitive files in
known locations on the local machine, accessing all of these with our
trusty browser commonly known as IE, leaves us with ample opportunity
to wreak further havoc on the unsuspecting customers of the
manufacturer, one "Microsoft".

For an ever increasing list of component possibilities seek here:

http://www.pivx.com/larholm/unpatched/

Once again the problem lies within our trusty and battle-hardened
Windows Media Player. Two second creation of Zero second URL flip to
local machine, allows us the desired access. Whether this is the
result of a 'trusted' media file or not is unclear. Not important.
Custom crafted media files seem to fail.

Working Example:

Fails on WMP 9 but fully functional on all others regardless of
operating system:

ATTENTION: demo is merely first step. Plug 'n Play any of the
available components in the listing above for maximum results:

http://www.malware.com/once.again!.html

Notes:

1. We appear to be going around and around in circles now
2. We see no possibility of ever expending one red cent to this
particular toy manufacturer. As such we are stuck with what we have.
We would be interested to thoroughly examining the latest and
greatest toys created by these people and should someone feel like
lending us a couple shiny new machines with default installs of the
latest and greatest toys, we'll be happy come to some sort of mutualy
beneficial arrangement.
3. None.


--
http://www.malware.com



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close