AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Icq sound wav2/19/2023 ![]() Of course this exploit depends upon the IRC software being located in the default location. ![]() Soundschemes to prefent this from happening In the long term icq will have to use something like random foldernames for Locate the scm extention and change the default behaviour to prompt before Go to the file types tab in tools > folder options Open explorer (the file manager not the browser) Html files in the mht archive, But for some reason i wasn't able to get this I dont think its necisary to use one of ie's exploit as you can also call Mhtml:file:///C:/Program Files/ICQ/Sounds/flame/Auth.wav!file:///C:/fire.exe Then i use one of the many available local code execution vulnerabilitiesįound in internet explorer recently to execute the embedded binary with this In reality however this is not a wav file but a mht (mail archive file) with The second file is just the sound files in wav and ogg if anyone wants them for something else. I have only tested this update on my nexus one running cm6rc2. The scm file i use creates a auth.wav file. It also moves some icq sounds to your systems notification folder so you can use the 'uh oh' sound for incoming messages or whatever. The default action for icq soundscheme (scm) files is open it places the wavįiles included with the scm file in a known location on the hard disk.įlame.scm wil be downloaded and installed in C:\Program It does infact allow you to run code of your choosing on a victims machineīy creating a specially crafted webpage and sound scheme file Morning and made the connection with some other research I did. Some other research and this one was forgotten untill i read adams post this Well i dont know if it will destroy the world, but sure enough it's enoughĪctually i found the "hole" adam discovered myself a few months back butĭidn't think it was particularly world shocking at the time so i didnt evenīother to report it (silly me), Over the course of the last moths I did That one who will finally destroy the world :>]: Right after I discovered it [and still had a hope that I will be My AV software detected the example code as "Exploit.CodeBaseExec", a generic alert, when it appeared in the browser's cache. What follows is a post by Jelmer from the Netherlands.
0 Comments
Read More
Leave a Reply. |