| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: More fiction, more nonsense |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_00CB_01C2C30F.4E1E0070
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Again you switched to a separate issue. This is not the one you =
posted earlier which we have been discussing for a long time. You are =
looking like a fool still. You can't even keep track of your posts = which
should come as no surprise since you have repeatedly demostrated = that you
don't read them.
This too demonstrates no vulnerability in WMP. The issue is either =
with IE or the data binding component. I'd have to look closer to see =
which. The mention of the WMD being automatically opened sounds like = the
IE issue addressed by MS01-020.
Rich
"Geo." wrote in message =
news:3e30945c$1{at}w3.nls.net...
"Robert G Lewis" wrote in message
news:3e30131a$1{at}w3.nls.net...
> So a file being read by WMP will start IE and then execute
something.That's
> what I thought was going on.
Here's the actual description:
------------------
The Windows Media Package file (malware.wmd) is automatically opened =
from
web or news or mail, it automatically creates the malware folder in =
the
so-called 'Virtual Music" directory. It automatically extracts the
malware.asx meta file, which is valid but includes our Active X =
component as
above, and it extracts our malware.asf file which includes our URL =
flip.
The URL flip is called once the malware.asf starts playing, it creates =
an
"about" window from within the malware folder, the
"about" window =
includes
our databinding control which points to the malware.asx which is =
rendered as
*.html because the datafld header *IS* the *.asx meta tag !
And that all in turn executes! our file on the target computer.
-------------------
Geo.
------=_NextPart_000_00CB_01C2C30F.4E1E0070
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Again you
switched to a =
separate=20
issue. This is not the one you posted earlier which we have
been=20 discussing for a long time. You are looking like a fool =
still. You=20
can't even keep track of your posts which should come as no surprise = since you=20
have repeatedly demostrated that you don't read them.
This too
demonstrates no =
vulnerability=20
in WMP. The issue is either with IE or the data binding =
component. =20
I'd have to look closer to see which. The mention of the WMD being =
automatically opened sounds like the IE issue addressed by=20
MS01-020.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.