The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Internet Explorer drag&drop 0day


<< Previous INDEX Search src / Print Next >>
Date: Mon, 13 Feb 2006 14:57:39 +0200
From: Gadi Evron <ge@linuxbox.org.>
To: bugtraq@securityfocus.com,
Subject: Internet Explorer drag&drop 0day
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeded SMTP AUTH authentication, not delayed by milter-greylist-1.7.5 (linuxbox.org [24.155.83.21]); Mon, 13 Feb 2006 06:59:01 -0600 (CST)
X-Virus-Scanned: antivirus-gw at tyumen.ru

Matthew Murphy has just disclosed a vulnerability in Internet Explorer.

He will send his advisory later today, but as he is unable to right now, 
he asked me to email this for him.
[I didn't want to email the advisory itself as ALL CREDIT BELONGS TO HIM 
and I didn't want to take the credit away from him in any way. This is 
100% his work and his disclosure]

Microsoft decided to patch this only next year with SP3. As by now 6 
mounths passed since Microsoft was contacted, Matthew alerted them ahead 
of time he will make a public release on the 13th (today).

There have been several attempts to help Matthew and talk to Microsoft 
(including by me, as well as several others) and convince them this is 
indeed “bullet-in worthy” to avoid this public release.

This is not a critical vulnerability, as it requires user interaction. 
However, it is serious and shouldn’t be down-played.

Here are some interesting ways to exploit this using social engineering:
Scroll-bar, “smack the monkey”, moving naked girl (move mouse to make 
me...), web game, shopping list/wish list, “calibrate your mouse”, etc.

The advisory (and suggested work-around) can be found here:
http://www.securiteam.com/windowsntfocus/5MP0B0UHPA.html

In my opinion, this comes to prove 0days are USUALLY a "myth" (WMF being 
a good example of a real 0day), as this particular vulnerability has 
been known to me and some others for some time now awaiting public release.
Does anyone still think bad guys don't exploit (to whatever goals) a 
0day if it is out there?

        Gadi.

<< Previous INDEX Search src / Print Next >>



ðÁÒÔΣÒÙ:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
èÏÓÔÉÎÇ:

úÁËÌÁÄËÉ ÎÁ ÓÁÊÔÅ
ðÒÏÓÌÅÄÉÔØ ÚÁ ÓÔÒÁÎÉÃÅÊ
Created 1996-2024 by Maxim Chirkov
äÏÂÁ×ÉÔØ, ðÏÄÄÅÒÖÁÔØ, ÷ÅÂÍÁÓÔÅÒÕ