BugTraq
Back to list
|
Post reply
Re: [Full-Disclosure] MSIE <IFRAME> and <FRAME> tag NAME property bufferoverflow PoC exploit (was: python does mangleme (with IE bugs!))
Nov 08 2004 04:34AM
Menashe Eliezer (menashe finjan com)
In-Reply-To: <BAY10-DAV29UqLpHkat00000751 (at) hotmail (dot) com [email concealed]>
The published exploit is working also with the <EMBED> tag, and not just with the <IFRAME> and the <FRAME> tags.
Finjan's advisory can be found at: http://www.finjan.com/SecurityLab/AttackandExploitReports/alert_show.asp
?attack_release_id=114
==
Regards,
Menashe Eliezer
Senior application security architect
Malicious Code Research Center
Finjan Software
http://www.finjan.com/mcrc
Prevention is the best cure!
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
The published exploit is working also with the <EMBED> tag, and not just with the <IFRAME> and the <FRAME> tags.
Finjan's advisory can be found at: http://www.finjan.com/SecurityLab/AttackandExploitReports/alert_show.asp
?attack_release_id=114
==
Regards,
Menashe Eliezer
Senior application security architect
Malicious Code Research Center
Finjan Software
http://www.finjan.com/mcrc
Prevention is the best cure!
[ reply ]