New Exploit - no warning (Windows Explorer on XP)...

Discussion in 'other software & services' started by tosbsas, Jan 27, 2004.

Thread Status:
Not open for further replies.
  1. tosbsas

    tosbsas Registered Member

    Joined:
    Feb 9, 2002
    Posts:
    789
    Location:
    Lima, Peru
    Windows XP Explorer Executes Arbitrary Code in Folders
       
    SecurityTracker Alert ID: 1008843    
    CVE Reference: GENERIC-MAP-NOMATCH (Links to External Site)    
    Date: Jan 25 2004
       
    Impact: Execution of arbitrary code via network, User access via network
       
    Exploit Included: Yes
       
    Version(s): Windows XP Explorer
       
    Description: A vulnerability was reported in Microsoft Windows XP in Windows Explorer. A remote user can create a folder that, when viewed by the target user, will execute arbitrary code on the target user's system.

    http-equiv reported that a remote user can create a specially crafted 'folder' that includes HTML scripting code and a Windows executable ('.exe' file) containing arbitary code. When a target user attempts to view the contents of the 'folder' (which may be considered an ostensibly safe task by many users), the arbitrary code will be automatically executed on the target user's computer by Windows Explorer. The code will run with the privileges of the target user.

    If the 'folder' is an HTML-based file, Windows Explorer (on XP) will execute the file when viewed, extracted, or opened. The scripting code can reference the executable contained in the 'folder', causing the executable to run.

    A demonstration exploit is available at:

    h**p://www.malware.com/my.pics.zip
       
    Impact: A remote user can cause arbitrary code to be executed on the target user's system.
       
    Solution: No solution was available at the time of this entry.
       
    Vendor URL: www.microsoft.com/technet/security/ (Links to External Site)
       
    Cause: State error
       
    Underlying OS: Windows (XP)
       
    Reported By: "http-equiv@excite.com" <1@malware.com>
       
    Message History: None.


    - Changed title and deactivated the exploit demo link - LWM
     
  2. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,278
    Location:
    New England
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.