RE: Win32hlp exploit for : ":LINK overflow"

From: Rob Shein (shotenat_private)
Date: Thu Mar 13 2003 - 05:13:18 PST

  • Next message: Joe Orton: "Re: Apache 2.x leaked descriptors"

    But the .cnt file isn't directly executable; it gets called from the .hlp
    file.  This is the equivalent, in that way, of sending them an evil .dll
    file and hoping they register it.
    
    > -----Original Message-----
    > From: Josh Gilmour [mailto:jgilmourat_private] 
    > Sent: Thursday, March 13, 2003 7:13 AM
    > To: 'Rob Shein'; 'descript'; vuln-devat_private; 
    > bugtraqat_private
    > Subject: RE: Win32hlp exploit for : ":LINK overflow"
    > 
    > 
    > Personally, I know people who know that they shouldn't 
    > download or open .exe's due to viruses, yet they would have 
    > no clue about .cnt or .hlp files. That being said it could be 
    > a risk for them, yet people with some experience would 
    > noticed that something isn't right and ignore it... But 
    > that's just me....
    > 
    > I could have it wrong also, but does the risk happen because 
    > the .cnt can be emailed to someone/sent to them, and they 
    > could download and run it? That's how I see it working 
    > anyways, just like running an executable from an email. 
    > 
    > - Josh
    > 
    > -----Original Message-----
    > From: Rob Shein [mailto:shotenat_private] 
    > Sent: Tuesday, March 11, 2003 8:59 AM
    > To: 'descript'; vuln-devat_private; bugtraqat_private
    > Subject: RE: Win32hlp exploit for : ":LINK overflow"
    > 
    > I'm not entirely sure I get how serious this is.  If I 
    > understand correctly, you're modifying a .cnt file so that 
    > when it's called (by using it's corresponding .hlp file) it 
    > will go out and download/execute a program from a 
    > predetermined site.  When you're at the stage where you can 
    > modify files on the target machine, how much of a difference 
    > does it make to be able to get a .cnt file to do your 
    > bidding, as opposed to any executable that could have another 
    > executable bound to it, for example?  Perhaps I'm missing something...
    > 
    > > -----Original Message-----
    > > From: descript [mailto:descriptat_private]
    > > Sent: Saturday, March 08, 2003 7:38 PM
    > > To: vuln-devat_private; bugtraqat_private
    > > Subject: Win32hlp exploit for : ":LINK overflow"
    > > 
    > > 
    > > hi list,
    > > 
    > > In date Sunday, 9 March, 2003 1:00 AM s0h released an exploit
    > > : Win32hlp exploit for : ":LINK overflow"
    > > 
    > > Source : http://s0h.cc/exploit/s0h_Win32hlp.c
    > > Binary : http://s0h.cc/exploit/s0h_Win32hlp.exe
    > > 
    > > Discovered by ThreaT <threatat_private>.
    > > Coded by ThreaT <threatat_private>
    > > Hompage : http://s0h.cc/~threat/
    > > 
    > > This exploit can trap a .CNT file (file with .HLP files) with
    > > the arbitrary code who can download and execute a trojan 
    > > without user ask.
    > > 
    > > This exploit was tested on :
    > > 	- Windows 2000 PRO/SERVER (fr) SP0
    > > 	- Windows 2000 PRO/SERVER (fr) SP1
    > > 	- Windows 2000 PRO/SERVER (fr) SP2
    > > 
    > > 
    > > Best regards,
    > > descript <descriptat_private>
    > > s0h - Skin of humanity
    > > http://s0h.cc
    > > 
    > 
    > 
    



    This archive was generated by hypermail 2b30 : Thu Mar 13 2003 - 09:13:16 PST