[15494] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Force Feeding

daemon@ATHENA.MIT.EDU (M. Burnett)
Tue Jun 27 16:28:27 2000

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-ID:  <002a01bfdf9f$77438110$d912c5d1@xato.net>
Date:         Mon, 26 Jun 2000 12:50:55 -0600
Reply-To: "M. Burnett" <mark@BURNETTS.NET>
From: "M. Burnett" <mark@BURNETTS.NET>
To: BUGTRAQ@SECURITYFOCUS.COM

> The demo exploit won't work in W2K because the temp directory where the
> .exe is downloaded to is  "c:\documents and
> settings\'username'\local settings\temp".  If it is possible to get the
> username through JavaScript and another ActiveX control it could possibly
> be made to work there also.

Although I haven't tested it, I believe you can use environment variables in
the codebase location.  The variable to use would be %USERPROFILE% although
you could also use %HOMEPATH%, %TEMP%, or %TMP%.


M. Burnett

home help back first fref pref prev next nref lref last post