BugTraq
Exploit/DoS in MS Internet Explorer 6.0 (OBJECT Tag) Apr 16 2003 07:55PM
Ryan Emerle (securityFocus emerle net) (2 replies)
RE: Exploit/DoS in MS Internet Explorer 6.0 (OBJECT Tag) Apr 16 2003 10:22PM
Steve Ryan (argon charter net)
Re: Exploit/DoS in MS Internet Explorer 6.0 (OBJECT Tag) Apr 16 2003 10:12PM
Roland Postle (mail blazde co uk)
><object id="test"
> data="#"
> width="100%" height="100%"
> type="text/x-scriptlet"
> VIEWASTEXT></object>

What I think is happening is that IE takes the URL '#' on it's own to
mean current document. (You can ahieve the same affect by specifying
data="document.html" where document.html is the name of the html file
running the code.)

When the data in the file '#' is embedded into the document and
executed it too contains the same object tag which embeds the document
again and again. Eventually it runs out of stack space. I doubt this is
exploitable on it's own except as a DoS.

- Blazde

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus