lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <41A9F4DC.8000000@umbrella.name>
Date: Sun, 28 Nov 2004 23:55:08 +0800
From: Liu Die Yu <liudieyu@...rella.name>
To: bugtraq@...urityfocus.com, ntbugtraq@...tserv.ntbugtraq.com,
   full-disclosure@...ts.netsys.com
Subject: Address Bar Spoofing on Double Byte Character Set Locale Vulnerability
 (CAN-2004-0844) Patched in MS04-038


Overview
========
On "Double Byte Character Set Locale" systems(Chinese, Japanese, etc), 
there exists a spoofing vulnerability within Microsoft Internet Explorer 
that enables attackers to fake the Address field.

Exploit
=======
http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTime.html

Patch
=====
http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx

Details
=======
The research started when I found:
Input %fe@...rella.name in the address field and press ENTER: MSIE will 
go to the homepage of Umbrella.name, but the address field will display 
"http://@...rella.nam/e". After playing this for several times, I made 
the exploit mentioned above.

I still do not know the mechanism behind this bug.

It may be helpful to read the official description of this issue from 
Microsoft TechNet
-----QUOTE-START-----
Aspoofing vulnerability exists in Internet Explorer's processing of URLs 
on Double Byte Character Set systems. This vulnerability could result in 
an incorrect URL being listed in the Address bar that is not the actual 
Web page that is displayed by Internet Explorer.
-----QUOTE-ENDOF-----
"Aspoofing" - http://www.onelook.com/?w=aspoofing&ls=a
(
    Look up "Aspoofing" in your English dictionary, then you can learn 
how carefully they prepared this security bulletin.
    To learn more about MSRC, don't miss: A Tour of the Microsoft 
Security Response Center (MSRC)
       
 http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTime-msrc_explained.html
    
)

Credit
======
Liu Die Yu - http://umbrella.name/

Send to Friend
==============
http://editive.com/referrer

Greetings
=========
Drew Copley, Malware, Guninski, Feng4ever, Jelmer, Zhouwei, mom and dad.

##### END OF FILE #####

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ