lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <001001c4ba35$ab8d6560$0000fea9@grotedoos>
Date: Mon, 25 Oct 2004 03:55:10 +0200
From: "Berend-Jan Wever" <skylined@...p.tudelft.nl>
To: "ned" <nd@...inemenace.org>, <bugtraq@...urityfocus.com>
Cc: <full-disclosure@...ts.netsys.com>
Subject: Re: python does mangleme (with IE bugs!)


Hi all, here's my analysis of these bugs:

2445.html does nothing on my win2ksp4en/ie6.0sp1. (IE does crash when you load it because the META refresh tag leads to 2446.html.)
2446.html contains an exploitable BoF in the IFRAME tag using the SRC and NAME property. To trigger the BoF you only need this tag in a HTML file:
<IFRAME SRC=AAAAAAAAAAAA.... NAME="BBBBBBBBBBB....">

Exactly why or how it happens, I do not know yet. I do know you can control EAX, after which this gets executed:
7178EC02                      8B08            MOV     ECX, DWORD PTR [EAX]
7178EC04                      68 847B7071     PUSH    SHDOCVW.71707B84
7178EC09                      50              PUSH    EAX
7178EC0A                      FF11            CALL    NEAR DWORD PTR [ECX]
Control over EAX leads to control over ECX, which you can use to control EIP: Remote Command Execution.

They'd better patch this one quickly, a reliable working exploit shouldn't take more then a day to code.

Cheers,
SkyLined

----- Original Message ----- 
From: "ned" <nd@...inemenace.org>
To: <bugtraq@...urityfocus.com>
Cc: <full-disclosure@...ts.netsys.com>; <lcamtuf@...ttot.org>
Sent: Sunday, October 24, 2004 06:36
Subject: [Full-Disclosure] python does mangleme (with IE bugs!)


> i've made a port of mangleme:
> http://felinemenace.org/~nd/htmler.py
> with a few extra quirks (such as file extentions/url types)
> 
> it finds IE bugs after roughly 2.5 -> 3 hours and they are at:
> http://felinemenace.org/~nd/crash_ie/
> 
> They are not the null pointer dereference that Michal found (which 
> curiously seems to not own my 6.0.2800.1106.xpsp1?) but some other 
> probably non-exploitable problems!
> 
> htmler.py doesn't use CGI like mangleme but generates webpages in the 
> directory 'html1' numbered 0.html to n.html. 0.html then uses a refresh to 
> load 1.html and so on with little user interaction required!
> 
> anyway, if you find bugs with it, don't sell to anyone/notify vendors!
> - nd
> 
> -- 
> http://felinemenace.org/~nd - "eat a duck"
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ