[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060304213509.13100.qmail@securityfocus.com>
Date: 4 Mar 2006 21:35:09 -0000
From: porkythepig@...pi.pl
To: bugtraq@...urityfocus.com
Subject: vulnerability in the IE Java applet initialization engine
There is a vulnerability in the Internet Explorer
java applet handling engine. It occurs while running at Sun Microsystems Java VM and is caused by inproper HTML 'INPUT' control focus handling.
After focusing the control before the successful applet intialization numerous browser failures appears.
Beside a final DoS condition it causes also a failure in the keyboard and mouse input messages
handling in browser (eg: AltF4, browser window close button, document text selection)
Sun Microsystems Java need to be installed and set as default VM for IE
to exploit this vulnerability.
The same Sun Java VM version running at other browsers (eg: Firefox, Opera)
works fine and handles this exploitation conditions without any problems, which
means it is not the problem with Sun Microsystems Java but with wrong java applet handling
implemented in IE.
Successful exploitation of this vulnerability causes a DoS condition and a browser crash
during to nullpointer assignment in mshtml.dll module in one of IE threads.
The example DoS exploit including Java applet source code can be found at:
http://www.anspi.pl/~fex/rx6502.html
vulnerability found by: porkythepig
Powered by blists - more mailing lists