MS Internet Explorer 6.0 (mshtml.dll) Denial of Service Exploit Dec 03 2006 07:27PM
ajannhwt hotmail com (1 replies)
Re: MS Internet Explorer 6.0 (mshtml.dll) Denial of Service Exploit Dec 05 2006 03:25PM
3APA3A (3APA3A SECURITY NNOV RU)
Dear ajannhwt (at) hotmail (dot) com [email concealed],

First, array index overflow is usually very dangerous and is exploitable
to code execution in many cases.

Second, this one is not new. It was reported by Michal Zalewski in March
and is patched in current Internet Explorer versions:

http://www.security.nnov.ru/Ldocument832.html

Third, your 'examle' is very like Michal's one except he doesn't use
'lcamtuf'.

http://lcamtuf.coredump.cx/iedie.html

--Sunday, December 3, 2006, 10:27:03 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:

ahc> [[DOS]]]------------------------------------------------------

ahc> All Events, (onclick,oneror,onmouseover,onload etc.)

ahc> Example:

ahc> Save to .html file
ahc> *(a)*

ahc> <a href=x onclick=ajann onclick=ajann onclick=ajann
ahc> onclick=ajann onclick=ajann onclick=ajann onclick=ajann

--
~/ZARAZA
http://www.security.nnov.ru/

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus