[5192] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Active X exploit.

daemon@ATHENA.MIT.EDU (Andreas Bogk)
Tue Aug 26 19:16:43 1997

Date: 	Wed, 27 Aug 1997 00:40:40 +0200
Reply-To: Andreas Bogk <andreas@ARTCOM.DE>
From: Andreas Bogk <andreas@ARTCOM.DE>
X-To:         Peter Shipley <shipley@DIS.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Peter Shipley's message of Mon, 25 Aug 1997 15:14:22 -0700

>>>>> "Peter" == Peter Shipley <shipley@DIS.ORG> writes:

    Peter> There is a new expliot for active X
    Peter>     http://www.network-security.com/activex/

This exploit is not new, a similiar program has been around on

http://www.thur.de/home/steffen/activex/index_e.html

since march. And the principle is the same on all ActiveX
exploits. There simply is no security, ActiveX controls are simple
DLLs.

Andreas

--
Never underestimate the value of fprintf() for debugging purposes.

home help back first fref pref prev next nref lref last post