lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7BE8B2EFA7D0DE4F9E31B7F69EA2CF3D02384E19@MAILER.er.ucsd.edu>
Date: Fri, 9 Feb 2007 10:55:23 -0800
From: "McCarty, Eric C." <emccarty@...ucsd.edu>
To: "Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]" <sbradcpa@...bell.net>,
	<clappymonkey@...il.com>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Denial Of Service in Internet Explorer for MS Windows Mobile 5.0

A Couple points I'd like to make here...

1). 90 days is plenty of time to fix a vulnerability, and in this case
the author is merely stating the details of which will be revealed after
90 days. I doubt this will lead to any mass exploitation as I imagine
you will need to go to a "specially crafted" website to exploit this DoS
condition anyway.   "... should the device browser access a WML page
with malformed content..."

Seems pretty harmless, annoying, but harmless. You go to an "evil" page
and your mobile browser crashes and you need to hard reboot, yeah not a
lot of reason to mass exploit this imho. 

2). I'm pretty sure it's pwned, or owned, but not p0wned. 
http://www.urbandictionary.com/define.php?term=pwned

3). Thanks for the info on that DST patch issue, good to know.

Eric McCarty
 

-----Original Message-----
From: Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]
[mailto:sbradcpa@...bell.net] 
Sent: Friday, February 09, 2007 10:09 AM
To: clappymonkey@...il.com
Cc: bugtraq@...urityfocus.com
Subject: Re: Denial Of Service in Internet Explorer for MS Windows
Mobile 5.0

With all due respect..... the "90 days fix it or else" on a mobile 
platform is being optimistic don't you think when I'm still struggling 
getting a cab file update on all of my mobile phones for the time change

issue.

Quite frankly a denial of service on IE on a phone will get me yelled at

...it won't get me p0wned.  I'm going to already be yelled at when their

calendars are all screwed up so quite frankly on the threat of being 
yelled at scale  .... right now Daylight Savings issues has a higher 
priority.

http://support.microsoft.com/kb/932046
For those not aware, in a few weeks the USA time zones spring forward 
earlier than they have been. 
Mobile phones need a DST patch along with just about everything else....



clappymonkey@...il.com wrote:
> Denial Of Service in Internet Explorer for MS Windows Mobile 5.0
> -----------------------------------------------------------------
>
> Date of Release: 09/02/2007
>
> Description: A vulnerability exists in Internet Explorer for Microsoft
Windows Mobile 5.0 (for smart phone and pocket PC) that impacts upon the
availability and security of devices operating on this platform. It is
possible for an attacker to create an overflow state within Internet
Explorer, resulting in the termination of the normal functionality of IE
and a Denial of Service, should the device browser access a WML page
with malformed content. Users of affected devices must perform a hard
battery reset in order to resume Internet Explorer and normal device
operations. 
>
> Patch / Fix: No patch is available at this time
>
> Advisory History: This issue was first reported to Microsoft on
31/01/07. 
>
> Full technical details of this vulnerability will be withheld for the
next ninety days, or until such time as a patch / fix is forthcoming
(whichever event happens first).
>
> Credit: Michael Kemp (www.clappymonkey.com)
>
>   

-- 
Letting your vendors set your risk analysis these days?  
http://www.threatcode.com

If you are a SBSer and you don't subscribe to the SBS Blog... man ... I
will hunt you down...
http://blogs.technet.com/sbs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ