Proof of Concept for Internet Explorer Modal Dialog Exploit

Pretty interesting and imaginative way to exploit the flaw in IE…yeah I know linked to ActiveX again, all the more reason to use Firefox right?

It just shows that the browser really is a point of entry, this could be useful for a penetration test, another way to show how easy it is to get in via internet explorer, the frequency with which IE exploits have been coming out recently is scarier than normal.

A particular scenario was identified that involved the exploitation of the modal ActiveX prompt delivered by some systems. The user is asked to type a certain string of characters (ala captcha). A prompt will be displayed (hopefully during the time the user is typing the string) to install the Microsoft Surround Video Control.

If you’re still typing the “captcha” when the prompt appears, you’ll install the control. This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1. If the software you install hoses your box, just remember that it’s signed by Microsoft. In
other words… don’t look at me.

You can check the PoC here:

Proof of Concept for IE Modal Dialog Issue

It just crashes IE for me, I’m not sure if it’s a null pointer or what, but I’m sure there’s some way to exploit it to take over the machine, it’s a another vulnerability, which usually can be mashed together with a couple of others to get complete control.

By Matthew Murphy spotted on Vulnwatch

Posted in: Exploits/Vulnerabilities, Windows Hacking

, , , ,

Latest Posts:

SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.

5 Responses to Proof of Concept for Internet Explorer Modal Dialog Exploit

  1. mozzy May 2, 2006 at 12:20 pm #

    Hey there,
    Well I am not a fan of IE either but dude….c’mon “This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1.”

    Don’t you think that all earlier versions of browsers (systems) have flaws that you could test around with if not the needed updates are installed? Which user in the right mind does not have XP SP2 on the machine (if he installed windows at all).

    However, I enjoy reading your blog…lots of interesting and funny stuff here. This was the only post that kept me thinking that it is kinda wrong ;)

    It is like stabbing in open wounds xD

  2. Darknet May 2, 2006 at 5:05 pm #

    mozzy: Well I’m still still using Windows 2000 as are a lot of people I know as we MUCH prefer it to Windows XP (raw sockets pls?)

    And I know quite a lot of people with older computers running Windows98, not everyone can afford the latest hardware.

    So I’m pretty sure it still effects a significantly large demographic, and it crashed my IE on XP SP2 anyway..

    Sorry to be outdated ;)

  3. mozzy May 3, 2006 at 6:03 am #

    he he
    well… don’t know what to say…
    would you run a red hat version without neccessary security updates?

    i wouldn’t thought so…

    but you’re right. It bothers me too that XP requires quiet some hardware (though i was running XP SP 2 on a Celeron 2.4 with 128 RAM without severe problem thanks to the ability to disable all styles and animations)

    but what is really interesting is that it crashed IE with you on XP SP2 though the article says that it is not affected…are you maybe missing updates?

    I am going to make my own system…with black jack and hookers :P

    however about the Raw sockets issue i found you two very interesting articles :)
    Talks about how to fix this issue in XP AND 200 ;)
    Talks about how microsoft does not really care about these issues xD

    The later article is interesting butnot really useful whereas the first one helps you to secure your system (if don’t know already ;) )

    sorry for double posting…
    but i just found this one regarding raw sockets
    The article wit the title “Microsoft Removes Raw Sockets from XP”

    Updates, updates, updates…


  4. Darknet May 3, 2006 at 6:24 am #

    Well my Win2k is fully up to up to date as it can be anyway.

    A Celeron 2.4 is a very powerful machine relatively…I’m talking about those computers like Pentium II 333mhz. How can those run Windows XP?

    And yes people are still using such machines.

    Yah I’m pretty sure the XP SP2 has all updates, as it even has the stupid Genuine Advantage thing installed, which was only last week.

    Try not to quote if you can, most people in the security industry think Steve Gibson is a raving lunatic ;)

    He does have some good coverage on the raw sockets issue though. But why hack the OS to give back some functionality you shouldn’t have lost in the first place?

    Luckily the new nmap compensates the problem with the ability to send Ethernet frames.

  5. mozzy May 3, 2006 at 6:33 am #

    Maybe this one helps for those who would like to run XP on a “weak” machine :)