[24730] in bugtraq

home help back first fref pref prev next nref lref last post

RE: MSIE vulnerability exploitable with IncrediMail

daemon@ATHENA.MIT.EDU (RT)
Mon Mar 18 22:34:18 2002

Date: Sat, 16 Mar 2002 00:58:52 +0000 (GMT)
From: RT <roelof@sensepost.com>
To: Thor Larholm <Thor@jubii.dk>
Cc: "'Eric Detoisien'" <eric.detoisien@global-secure.fr>,
        <bugtraq@securityfocus.com>
In-Reply-To: <52D05AEFB0D95C4BAD179A054A54CDEB1BD1F6@mailsrv1.jubii.dk>
Message-ID: <20020316005222.U30061-100000@redknuckle.sensepost.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

Immm...

Eudora Mail .. automatically saves attachments in <drive>:\program
files\qualcomm\eudora\attachments .. right?

The (very old) version (4.1) that I have sure does that. And even if you delete
the email itself (after opening), or right click on the file and selecting delete -
the file stays.

So, you just need to get the file in there and have the user visit a corrupted
web .. and hey.. presto!

Just my 2c on this,
Roelof.

On Fri, 15 Mar 2002, Thor Larholm wrote:

+Isn't {42D00B20-479C-11d4-9706-00105A40931C} a GUID for your user account,
+and as such unknown from time to time, making the proposed exploit
+unfeasable ?
+
+
+Regards
+Thor Larholm
+Jubii A/S - Internet Programmer
+
+

------------------------------------------------------
Roelof W Temmingh               SensePost IT security
roelof@sensepost.com            +27 83 448 6996
http://www.sensepost.com        http://www.hackrack.com


home help back first fref pref prev next nref lref last post