[41984] in bugtraq

home help back first fref pref prev next nref lref last post

RE: WMF browser-ish exploit vectors

daemon@ATHENA.MIT.EDU (James C Slora Jr)
Thu Jan 5 23:25:00 2006

From: "James C Slora Jr" <Jim.Slora@phra.com>
To: <bugtraq@securityfocus.com>
Date: Thu, 5 Jan 2006 17:36:47 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In-Reply-To: <dpei63$177$1@sea.gmane.org>
Message-Id: <20060105223717.A13852331B1@mail8-red.bigfish.com>

Dave Korn wrote 

> Have you tried giving it a mpg/avi/wma/wmv extension and getting
> it to open in a (perhaps embedded) mediaplayer?  That's liable to
> work as well; mediaplayer is also vulnerable to the 
>
choose-an-app-based-on-extension/app-loads-a-viewer-based-on-actual-content
> desynchronisation attack...

I have seen at least one cached .wmz (Windows Media Player Skin) file
trigger AV alerts for the WMF exploit (Symantec Bloodhound.Exploit.56) after
having been opened in WMP10.



home help back first fref pref prev next nref lref last post