TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Robert G Lewis
date: 2003-01-23 11:14:44
subject: Re: More fiction, more nonsense

From: "Robert G Lewis" 

Geo I had meant to post to the group 

So a file being read by WMP will start IE and then execute something.That's
what I thought was going on.

I'm glad to know that WMP doesn't have a security problem though, Just
because it seems to start the ball rolling its not responsible 

Rich is there any way to forbid WMP from starting IE . I didn't notice
anything in its options.

Bob Lewis

"Geo."  wrote in message
news:3e2f3b49$1{at}w3.nls.net...
> This section in the asf file that WMP reads:
>
> 
>  
> function malware(){
>
alert("malware");location=("file://C%3A%5CMy%20Documents%5CMy%20Music%
> 5CVirtual%20Albums%5Cmalware%5Cf ck.asx%20.")
>  }
>   
>
>
> Geo.
>
> "Robert G Lewis"  wrote in message
> news:3e2ecc9b{at}w3.nls.net...
> What is causing the pages to load in IE so the script can be ran ?
>
> Bob Lewis
>
>   "Rich"  wrote in message news:3e2eca1f{at}w3.nls.net...
>      Their you go with lies again.  There is no script being run by WMP.
> All the script in these examples is in web pages that are opened in IE.
>
>   Rich
>
>     "Geo."  wrote in message
news:3e2e7cbc{at}w3.nls.net...
>     I beg to differ, since WMP is being used to execute code that the
hacker
>     wrote, by definition there is an exploit in WMP. You of course are
free
> to
>     call it a feature if you like.
>
>     Geo.
>
>     "Rich"  wrote in message news:3e2e16e9{at}w3.nls.net...
>        Obviously you do not understand.  There is no exploit in WMP in
> either
>     case.  Maybe you want to argue that the HTTP protocol is still
unpatched
>     because all exploits in all browsers involving a web site require HTTP
> and
>     when HTTP is disabled none of these exploits work.
>
>     Rich
>
>       "Geo."  wrote in message
> news:3e2df83a$1{at}w3.nls.net...
>       I understand what you are saying but the wimpy exploit is not
patched
> is
>     it?
>       What was patched was stage 2 of the hack (and maybe stage 3). The
> media
>       player exploit that's used to kick it off is still functional even
> after
>     you
>       patch IE.
>
>       Geo.
>
>       "Rich"  wrote in message news:3e2ccb3f$1{at}w3.nls.net...
>          I know exactly which report it was to which you referred.  You
> included
>     a
>       copy earlier.  Note that this one references the earlier whimpy
> report.
>     The
>       two are distinct reports.  Look at the dates.  They are a year
apart.
>     Also,
>       the report to which you refer starts out with a clear statement that
> it is
>       just another scenario trying to exploit problems reported earlier.
> While
>       both try to implicate WMP the only connection to WMP is that it is
> used as
>       one step in a complex sequence.  Also true of both cases is that IE
is
> the
>       significant component.  It's not just that IE was patched, but the
the
>     root
>       of the vulnerability is with IE which is what it was changed.  It's
> not
>     with
>       everything that is used in the complex scenario.  If you follow that
>     logic,
>       all these are vulnerabilities in the HTTP protocol because the HTTP
>     protocol
>       is used in all of these and if you disable the HTTP protocol system
> wide
>       then the vulnerabilities disappear.  That is the logic you tried
> earlier,
>       albeit incorrectly, with scripting.  It simply does not satisfy the
> rules
>     of
>       logic.
>
>       Rich
>
>         "Geo."  wrote in message
> news:3e2c9cbd$1{at}w3.nls.net...
>         Rich,
>
>         I value your knowledge about IE, but I don't see us agreeing on
> this.
>     Here
>         is a link to the original writeup
>
>         http://lists.insecure.org/lists/bugtraq/2002/Aug/0316.html
>
>         In that link just before step one he says it's a combination of
> several
>         exploits the one that's used to kick it off is the wimpy exploit
of
>     media
>         player, he even links to it in his post
>     http://www.malware.com/wimpy.html
>       so
>         we have the exploit author, the guy who discovered wimpy and me
> saying
>       it's
>         a media player exploit and you and MS saying it's an IE exploit.
> What
>       makes
>         his hack unique is the way in which he uses wimpy to control IE
>       components.
>
>         I think the difference in our viewpoints is because you are coming
> at it
>         from the patch side and I'm coming at it from the hack side. You
see
> it
>     as
>         being patched from IE, I see it as being exploited from Media
> player.
>
>         Geo.
>
>         "Rich"  wrote in message
news:3e2c354a$1{at}w3.nls.net...
>            Actually, it's an IE issue.  There was one IE issue which these
> folks
>         reported several distinct paths to the same issue as if they are
>     different
>         issues.  In any case, if you go back and read this thread you
posted
> a
>         different issue.  Try to read your own posts.  In any event, both
> are IE
>         issues.
>
>         Rich
>
>
>
>
>

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.