Clarification by GreyMagic software on the recent misconception that MS03-040 patched a problem that actually lies in Jelmer's ADODB.Stream vulnerability that gets utilized via Liu's file:javascript vulnerability, in conjunction with another vulnerability to allow a res:// URL to open that is also by Jelmer.
95f406a6bcd15a4e7e06fc3b035cc7eb79fb7d96a2fb040195fdcc9e8d1835b1
From: "GreyMagic Software" <security@greymagic.com>
To: "Bugtraq" <bugtraq@securityfocus.com>,
"Mindwarper *" <mindwarper@linuxmail.org>
>seems that even with the new Microsoft patch applied, the
>vulnerability works.
There is no reason for it not to work. MS03-040 doesn't claim to offer a
patch for ADODB.Stream or "file:javascript" vulnerabilities. It offers a
patch to the variation of the application/hta content-type header in object
elements, publicly disclosed by http-equiv.
This could have been easily determined by reading the bulletin properly.
>I have recently been playing around with the xml+windows media
>player exploit
This is NOT a vulnerability in WMP or MSXML, they are simply used as tools
in this attack.
MSXML is used here to create and pass along a SAFEARRAY and WMP is used to
run an executable once its protocol handler has been replaced by the real
vulnerability used here. That vulnerability is Jelmer's ADODB.Stream
vulnerability, which happens to be utilized via Liu's "file:javascript"
vulnerability, in conjunction with another vulnerability to allow a "res://"
URL to open (also by Jelmer).