Форум АНТИЧАТ

Форум АНТИЧАТ (https://forum.antichat.xyz/index.php)
-   Forum for discussion of ANTICHAT (https://forum.antichat.xyz/forumdisplay.php?f=72)
-   -   Microsoft Internet Explorer MHTML URI Buffer Overflow Vulnerability (https://forum.antichat.xyz/showthread.php?t=20029)

NeMiNeM 01.06.2006 23:50

Microsoft Internet Explorer MHTML URI Buffer Overflow Vulnerability
 
Published: May 31 2006 12:00AM
Updated: Jun 01 2006 06:52PM
Credit: Discovered by Mr.Niega <Mr.Niega@gmail.com>.

Microsoft Internet Explorer is susceptible to a remote buffer-overflow vulnerability in 'INETCOMM.DLL'. The application fails to properly bounds-check user-supplied input data before copying it into an insufficiently sized memory buffer.

Remote attackers may exploit this issue to crash applications that use the affected library. This includes Internet Explorer, Windows Explorer, and possibly others. Remote code execution may also be possible, but this has not been confirmed.

The following examples demonstrate this issue. Note that removing the '.url' file may have to be done through 'cmd.exe', since Windows Explorer may crash when attempting to delete the file.
Examples:
http://www.securityfocus.com/data/vu...its/18198.html
http://www.securityfocus.com/data/vu...oits/18198.url

Dracula4ever 08.06.2006 17:03

A very interesting information,10q very much.
Microsoft Internet Explorer is the worst product of microsoft!
Fire Fox rulezz!


Время: 03:54