lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 5 Dec 2012 21:21:39 +0200
From: "MustLive" <>
To: <>, <>
Subject: DoS vulnerabilities in Internet Explorer 7
	(access violation)

Hello list!

I want to warn you about Denial of Service vulnerabilities in Internet
Explorer. I've found these DoS holes in IE7 already in August 2010.

Affected products:

Vulnerable are Internet Explorer 7 (7.00.5730.13) and other versions of IE7.
IE6 and IE8 are not affected.



When a redirector with response 301, 302 or 303 and data: URI in Location
header included into a tag frame or iframe, the browser crashes (the attack
doesn't work with other 30x statuses). It happens due to access violation
(aka segmentation fault) in iexplore.exe.


This is 302 redirector on Perl. You can make similar redirectors with 301,
302 or 303 statuses.

As 301 redirector you can use my example with data: URI at TinyURL:

The attack works from the second attempt. So it's needed to go to redirector
twice (to set URL twice in address bar, or after appearing of error page to
return to previous page in the browser).

Example of attack with this redirector via vulnerability
( at United Nations' site (they haven't
fixed it since 29.04.2010, when I've found this hole and informed UN, so you
can use it for checking purposes):


2012.11.28 - announced at my site in another publication.
2012.12.01 - disclosed at my site (

Best wishes & regards,
Administrator of Websecurity web site

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists