TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-01-20 06:19:34
subject: Re: More fiction, more nonsense

From: "Geo." 

I'm talking about the "wimpy" exploit which is used in the
exploit instructions I posted. It is a media player exploit.

Geo.

"Rich"  wrote in message news:3e2b6222$1{at}w3.nls.net...
   As I said, you are thinking of an unrelated IE issue.  Actually, it may
be related.  I'd have to do some digging.  It is however unequivocally a
distinct claim of vulnerability and like the one we are discussing here,
not due to WMP.

Rich

  "Geo."  wrote in message
news:3e2b5728{at}w3.nls.net...
  the control you use to parse the html you keep saying IE runs and which
I'm
  saying is being run by Media player. The best part of the whole exploit,
  look at the asx header.

  databinding control:
datafld="<ASX><Entry><ref
  HREF=''/></ASX>"

  Geo.

  "Rich"  wrote in message news:3e2b39e5{at}w3.nls.net...
     Huh?  What data binding control?  There is no data binding here?  You
are
  thinking of an unrelated IE issue.

     The HTML page is being opened by and has the script run by IE.  It
  navigates to a local MHTML file also opened by IE.

  Rich

    "Geo."  wrote in message
news:3e2b239f$1{at}w3.nls.net...
    "Rich"  wrote in message news:3e2b1039{at}w3.nls.net...

    >   Again, no matter how many times you repeat it, it is not going to be
    true.  The only scripting in the exploit example is in the HTML page.
  Also,
    contrary to your claim below there is no HTML file with an ASF
extension.<

    You keep saying that but please explain how the databinding control is
    rendering as html if there is no scripting taking place? That's all
    happening in media player not IE.

    Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.