[38126] in bugtraq
UPDATED: the insider exploit( = the latest ie 0day which involves
daemon@ATHENA.MIT.EDU (Liu Die Yu)
Tue Jan 11 13:43:48 2005
Date: 11 Jan 2005 16:32:04 -0000
Message-ID: <20050111163204.8619.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Liu Die Yu <liudieyu@umbrella.name>
To: bugtraq@securityfocus.com
the insider exploit( = the latest ie 0day involving SHOWMODALDIALOG) was verified to work on winxp-en-pro-sp1-ms04004(MS04-004 = Q832894 = KB832894), but it does not work on winxp-en-pro-sp1-noextrapatch.
jelmer's exploit is not perfect: URLs are hardcoded, and JSP is not popular. so i made this PHP version for copy-and-play:
http://0daymon.org/monitor/insider/dir.zip
=====
i got it while preparing my collection of applicable IE 0day and related original posts:
http://0daymon.org/monitor/
that exploit doesn't work without that IE patch - quite weired, right?
and those phishers and their tech support are not as wise as the media describes:
1. they should have removed their code immediately after THE-INSIDER(RAFI from IS) published those URLs. but they still run their stuff to tell the whole world: "yes! we are criminals armed with 0day!"
2. at that time most of home-user systems( = their targets) were not uptodate, which means most of them didn't have MS04-004 required for the exploit to successfully compromise themself.
first i test, then i post :-)))