exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ie-parse.txt

ie-parse.txt
Posted Apr 27, 2003

The code used in Microsoft Internet Explorer to parse web servers' HTTP

tags | advisory, web
SHA-256 | 8409c280ff9852eade3c78cd582096e5c515b89d13acd91bc6e53196eeb73d5b

ie-parse.txt

Change Mirror Download



OVERVIEW
========

The code used in Microsoft Internet Explorer to parse web servers' HTTP
replies contains a buffer overflow vulnerability. Specifically the faulty
code is located in URLMON.DLL. A malicious user may exploit this
vulnerability to execute arbitrary code on an IE user's system.



DETAILS
=======

HTTP is the protocol used in communication between web servers and web
browsers. When a web page is viewed, the browser sends a HTTP request to
the server in question. The server then sends a HTTP reply which usually
contains the web page the browser requested. In addition to the
document body which is shown to the user, the HTTP reply contains some
header fields which e.g. specify how the document should be presented to
the user.

Due to missing or insufficient input validation, a buffer overflow
takes place in Internet Explorer when it receives a HTTP reply
with excessively long values in certain header fields. A buffer placed
on stack gets overrun and a malicious reply may overwrite data,
including the subroutine's return address, and thus direct the program
execution to an arbitrary address. The vulnerability is a traditional
stack-based buffer overflow and relatively easy to exploit.

This vulnerability can be used by an attacker to run any code in the
system of the victim viewing a special web page with Internet Explorer or
reading mail with Outlook or Outlook Express. More details will be
published later.



SOLUTION
========

The vendor was informed about the bug on March 16, 2003. Microsoft has
classified this vulnerability as critical and published a bulletin
and patch correcting the issue. These are available at

http://www.microsoft.com/technet/security/bulletin/MS03-015.asp

The information in the "Mitigating factors" section of Microsoft's
bulletin claiming that this vulnerability isn't exploitable by e-mail
borne attacks is incorrect. Test exploits have been produced for
WWW, Outlook, and Outlook Express attack scenarios. In each of the
cases, the exploit code runs without further user interaction on the
victim system. Furthermore, no e-mail attachments or any kind of
scripting are needed since the attack can be carried out via a standard
HTML. In fact merely starting the e-mail program can lead to exploitation
because (depending on configuration) it may automatically open the first
new message.



CREDITS
=======

The vulnerability was discovered by Jouko Pynnönen of Oy Online Solutions
Ltd, Finland. It was demonstrated on 25th April at Kontakti.net's
"Tekninen Tietoturva" seminar in Helsinki.



--
Jouko Pynnonen Online Solutions Ltd Secure your Linux -
jouko@solutions.fi http://www.solutions.fi http://www.secmod.com


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close