[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4687DC16.1030000@secniche.org>
Date: Sun, 01 Jul 2007 09:53:42 -0700
From: Aditya K Sood <zeroknock@...niche.org>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
websecurity@...appsec.org
Subject: Advisory : Internet Explorer Zone Domain
Specification Dos and Page suppressing.
Advisory : Internet Explorer Zone Domain Specification Dos and Page
Suppressing
Severity : Intermediate
Version : IE 6.0 - 7.0
Dated : 18 June 2007
Explanation:
The vulnerability is present in handling of domain names with different
parameters [ sub domains] when specified in the Intranet zone and
Restricted zone with different characters [* ,.]. TheInternet Explorer
show weird behavior in opening of those websites. The problem occurs in
loading of those websites there by resulting in DoS through the browser.
The problem occurs in resolving domain names in different zones by the
explorer. It can be launched remotely by a malicious attacker by
exploiting this vulnerable behavior through a rogue script and registry
functions. The problem persists if rogue entries or manipulated entries
are subjected into various zones.
So when a new instance of IE is loaded , the registry entries are
triggered up there by resulting in security impacts. The website page
gets suppressed. The page gets hanged for sometime , there
by showing a delay in loading of website and affects the CPU load.
Vendor Status : Reported To Microsoft Security Center.
Solution By Microsoft Security Center:
1. Avoid visiting untrusted Websites.
2. Script Restriction should be applied.
-----
Aditya K Sood
http://www.secniche.org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists