lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun Apr 23 02:12:42 2006
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: MSIE (mshtml.dll) OBJECT tag vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Michal Zalewski wrote:
> Perhaps not surprisingly, there appears to be a vulnerability in how
> Microsoft Internet Explorer handles (or fails to handle) certain
> combinations of nested OBJECT tags. This was tested with MSIE
> 6.0.2900.2180.xpsp.040806-1825 and mshtml.dll 6.00.2900.2873
> xpsp_sp2_gdr.060322-1613.
> 
> At first sight, this vulnerability may offer a remote compromise vector,
> although not necessarily a reliable one. The error is convoluted and
> difficult to debug in absence of sources; as such, I cannot offer a
> definitive attack scenario, nor rule out that my initial diagnosis will be
> proved wrong [*]. As such, panic, but only slightly.

On my XP SP2 box, your fourth example produces bizarre results.
FrontPage and Visual Studio survive it and appear to render it
semi-correctly.  Word renders it as plain text.  IE faults in mshtml.dll
with the null-pointer behavior you specified earlier.  However, *WINDOWS
EXPLORER* crashes in a very much exploitable way with what appears to be
a call through an uninitialized function pointer.

You end up with a function pointer being pulled from random places, so
sometimes it's exploitable and sometimes it isn't, but it seems like
this exploit interacts very differently with the shell than it does with
IE proper.  Exploiting that may be a bit hard, because (to my
knowledge), there's no way to remotely launch the shell itself.  I will
keep researching this, but there's obviously something exploitable going
on here...

As such, I think the "Panic, but only slightly" assessment is very
reasonable.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB5444D38

iD8DBQFEStTSfp4vUrVETTgRA9woAKCApz7FDYUfAL0X8l3GfAe+uwfQwwCeNQ9o
Y5CWb8dMUrqnZ7s404SxSDM=
=yrs6
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3729 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060422/1a2016d3/smime.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ