[14117] in bugtraq

home help back first fref pref prev next nref lref last post

ms activex setup ctl exploit.

daemon@ATHENA.MIT.EDU (Mukund)
Wed Mar 1 18:55:05 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <38BD3AB3.25A22903@hd2.vsnl.net.in>
Date:         Wed, 1 Mar 2000 21:13:47 +0530
Reply-To: Mukund <muks@HD2.VSNL.NET.IN>
From: Mukund <muks@HD2.VSNL.NET.IN>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

hi. this is my first posting to bugtraq.
a complete description of the microsoft active setup control's
unsigned cab file execution vulnerability and exploit is published
on securityfocus. you may want to check this out.
this is a sad vulnerability. one can actually transfer an EXE file
to the other side and get it executed without the user's knowledge.



http://www.securityfocus.com/data/vulnerabilities/exploits/775.html

an alternate address is:

http://www.crosswinds.net/~muks/


SHORT MESSAGE: if you use outlook express,
download the patches for the above off microsoft's
site and install them. or turn off all activex controls in your
security settings of outlook express. better yet, change your
mail client.

this exploit is published at

http://www.securityfocus.com/bid/775/

cheers!
mukund

home help back first fref pref prev next nref lref last post