ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] Fwd: [Full-disclosure] More URI Handling Vulnerabilites (FireFox Remote Command Execution)




--This is a forwarded message
From: Billy Rios <billy.rios@xxxxxxxxx>
To: full-disclosure@xxxxxxxxxxxxxxxxx <full-disclosure@xxxxxxxxxxxxxxxxx>
Date: Wednesday, July 25, 2007, 4:02:10 AM
Subject: [Full-disclosure] More URI Handling Vulnerabilites (FireFox Remote 
Command Execution)

===8<==============Original message text===============
Internet Explorer has received a lot of attention lately for the way
it handles requests for external URIs....  Nate and I have warned that
IE isn't the only browser with URI handling issues....

I've posted a PoC for remote command execution in Firefox (2.0.0.5),
Netscape Navigator 9, and mozilla at:
http://xs-sniper.com/blog/2007/07/24/remote-command-execution-in-firefox-2005/

These specific examples are built for WinXP SP2 WITH NO OTHER EXTERNAL
EMAIL programs installed.  Users with Outlook, notes, or other
external mail programs installed may have had their URI handlers
modified by the external program.

Take some improperly registered URIs combined with a lack of
sanitation by the browser and we've got problems.... its time to take
another look at the URIs on your machine...

-- 
Billy (BK) Rios
http://www.xs-sniper.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
===8<===========End of original message text===========


-- 
~/ZARAZA
http://securityvulns.ru/



 




Copyright © Lexa Software, 1996-2009.