BugTraq
Address Bar Spoofing on Double Byte Character Set Locale Vulnerability (CAN-2004-0844) Patched in MS04-038 Nov 29 2004 03:46AM
Liu Die Yu (liudieyu umbrella name)
Resending ...

Overview
========
On "Double Byte Character Set Locale" systems(Chinese, Japanese, etc),
there exists a spoofing vulnerability within Microsoft Internet Explorer
that enables attackers to fake the Address field.

Exploit
=======
http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTi
me.html

Patch
=====
http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx

Details
=======
The research started when I found:
Input %fe (at) umbrella (dot) name [email concealed] in the address field and press ENTER: MSIE will
go to the homepage of Umbrella.name, but the address field will display
"http://@umbrella.nam/e". After playing this for several times, I made
the exploit mentioned above.

I still do not know the mechanism behind this bug.

It may be helpful to read the official description of this issue from
Microsoft TechNet
-----QUOTE-START-----
Aspoofing vulnerability exists in Internet Explorer's processing of URLs
on Double Byte Character Set systems. This vulnerability could result in
an incorrect URL being listed in the Address bar that is not the actual
Web page that is displayed by Internet Explorer.
-----QUOTE-ENDOF-----
"Aspoofing" - http://www.onelook.com/?w=aspoofing&ls=a
(
Look up "Aspoofing" in your English dictionary, then you can learn
how carefully they prepared this security bulletin.
To learn more about MSRC, don't miss: A Tour of the Microsoft
Security Response Center (MSRC)

http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTi
me-msrc_explained.html

)

Credit
======
Liu Die Yu - http://umbrella.name/

Send to Friend
==============
http://editive.com/referrer

Greetings
=========
Drew Copley, Malware, Guninski, Feng4ever, Jelmer, Zhouwei, mom and dad.

##### END OF FILE #####

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus