lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4687DC16.1030000@secniche.org>
Date: Sun, 01 Jul 2007 09:53:42 -0700
From: Aditya K Sood <zeroknock@...niche.org>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	websecurity@...appsec.org
Subject: Advisory : Internet Explorer Zone Domain Specification Dos and Page
 suppressing.

Advisory : Internet Explorer Zone Domain Specification Dos and Page
Suppressing
Severity : Intermediate
Version : IE 6.0 - 7.0
Dated : 18 June 2007


Explanation:
The vulnerability is present in handling of domain names with different
parameters [ sub domains] when specified in the Intranet zone and
Restricted zone with different characters [* ,.]. TheInternet Explorer
show weird behavior in opening of those websites. The problem occurs in
loading of those websites there by resulting in DoS through the browser.
The problem occurs in resolving domain names in different zones by the
explorer. It can be launched remotely by a malicious attacker by
exploiting this vulnerable behavior through a rogue script and registry
functions. The problem persists if rogue entries or manipulated entries
are subjected into various zones.


So when a new instance of IE is loaded , the registry entries are
triggered up there by resulting in security impacts. The website page
gets suppressed. The page gets hanged for sometime , there
by showing a delay in loading of website and affects the CPU load.

Vendor Status : Reported To Microsoft Security Center.

Solution By Microsoft Security Center:
1. Avoid visiting untrusted Websites.
2. Script Restriction should be applied.

-----
Aditya K Sood
http://www.secniche.org




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ