[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <49B0A2C1-7A7D-11D7-9140-000393941C60@wildpackets.com>
Date: Tue, 29 Apr 2003 13:00:55 -0700
From: Cove Schneider <cove@...dpackets.com>
To: "ERRor" <error@...htamt.ru>
Subject: Re: April appeared to be a month of IE bugs. Here's another one.
Spoke too soon. Safari eventually become responsive after a while.
On Tuesday, April 29, 2003, at 11:23 AM, ERRor wrote:
> Hello, Bugtraq.
>
> Malicious htm file can freeze IE with 100% CPU usage:
> Construct the file freeze.htm:
> c:\>perl -e "print qq'\xFF\xFE'; print qq'\r\n' x 30000" > freeze.htm
>
> After opening freeze.htm IE will hang with 100% CPU usage until
> IEXPLORE.EXE
> process is not killed. Two bytes (0xff 0xfe) at the beginning of the
> file
> mean that
> the encoding is unicode. So the internal unicode representation of the
> CR LF
> sequence
> will look like 0D0A0D0A but not 000D000A (if the file was a plain
> ASCII).
> Tested on IE 6.0 with all fixes, i think other versions also
> vulnerable.
>
>
> Best Regards, ERRor, dHtm.
> P.S. greets to .einstein. and dHtm
>
Powered by blists - more mailing lists