what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2004-315A

Technical Cyber Security Alert 2004-315A
Posted Nov 12, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-315A - Microsoft Internet Explorer (IE) contains a buffer overflow vulnerability that could allow a remote attacker to execute arbitrary code with the privileges of the user running IE. A buffer overflow vulnerability exists in the way IE handles the SRC and NAME attributes of various elements, including FRAME, IFRAME, and EMBED. Because IE fails to properly check the size of the NAME and SRC attributes, a specially crafted HTML document can cause a buffer overflow in heap memory. Due to the dynamic nature of the heap, it is usually difficult for attackers to execute arbitrary code using this type of vulnerability.

tags | advisory, remote, overflow, arbitrary
SHA-256 | dde5a26a7a4fb4dc3e79f0d5ca018fa7314b3d9e764f02c135b67d484a8eea60

Technical Cyber Security Alert 2004-315A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Technical Cyber Security Alert TA04-315A

Buffer Overflow in Microsoft Internet Explorer


Original release date: November 10, 2004
Last revised: --
Source: US-CERT


Systems Affected

Microsoft Windows systems running

* Internet Explorer versions 6.0 and later; previous versions of
Internet Explorer may also be affected

* Other programs that host the WebBrowser ActiveX control


Overview

Microsoft Internet Explorer (IE) contains a buffer overflow
vulnerability that could allow a remote attacker to execute
arbitrary code with the privileges of the user running IE.


I. Description

A buffer overflow vulnerability exists in the way IE handles the
SRC and NAME attributes of various elements, including FRAME,
IFRAME, and EMBED. Because IE fails to properly check the size of
the NAME and SRC attributes, a specially crafted HTML document can
cause a buffer overflow in heap memory. Due to the dynamic nature
of the heap, it is usually difficult for attackers to execute
arbitrary code using this type of vulnerability.

However, if heap memory is prepared in a special manner, an
attacker could execute arbitrary code more easily. Publicly
observed exploits use scripting to prepare the heap, though this
may be accomplished without scripting. Without the ability to
prepare the heap, the impact is most likely limited to denial of
service.

This vulnerability is described in further detail in VU#842160.


II. Impact

By convincing a user to view a specially crafted HTML document
(e.g., a web page or an HTML email message), an attacker could
execute arbitrary code with the privileges of the user. The
attacker could also cause IE (or any program that hosts the
WebBrowser ActiveX control) to crash.

Reports indicate that this vulnerability is being exploited by
malicious code propagated via email. When a user clicks on a URL in
a malicious email message, IE opens and displays an HTML document
that exploits the vulnerability. This malicious code may be
referred to as MyDoom.{AG,AH,AI} or Bofra.


III. Solution

Until a complete solution is available from Microsoft, consider the
following workarounds:

Install Windows XP SP2

Microsoft Windows XP SP2 does not appear to be affected by this
vulnerability. If you are using Windows XP, please update to SP2.

Disable Active scripting

To help protect against attacks that use scripting to prepare the
heap, disable Active scripting in any zone used to render untrusted
HTML content (typically the Internet Zone and Restricted Sites
Zone). Instructions for disabling Active scripting in the Internet
Zone can be found in the Malicious Web Scripts FAQ.

Do not follow unsolicited links

Do not click on unsolicited URLs received in email, instant
messages, web forums, or Internet relay chat (IRC) channels. While
this is generally good security practice, following this behavior
will not prevent exploitation of this vulnerability in all
cases. For example, a trusted web site could be compromised and
modified to deliver exploit script to unsuspecting clients.

Read and send email in plain text format

Outlook 2003, Outlook 2002 SP1, and Outlook 6 SP1 can be configured
to view email messages in text format. Consider the security of
fellow Internet users and send email in plain text format when
possible. Note that reading and sending email in plain text will
not necessarily prevent exploitation of this vulnerability.

Maintain updated anti-virus software

Anti-virus software with updated virus definitions may identify and
prevent some exploit attempts. Variations of exploits or attack
vectors may not be detected. Do not rely solely on anti-virus software
to defend against this vulnerability. More information about viruses
and anti-virus vendors is available on the US-CERT Computer Virus
Resources page.


Appendix A. References

* Vulnerability Note VU#842160 -
<http://www.kb.cert.org/vuls/id/842160>

* Windows XP SP2 -
<http://www.us-cert.gov/cas/alerts/SA04-243A.html>

* Malicious Web Scripts FAQ -
<http://www.cert.org/tech_tips/malicious_code_FAQ.html>

* US-CERT Computer Virus Resources Page -
<http://www.us-cert.gov/other_sources/viruses.html>

* About the Browser (Internet Explorer - WebBrowser) -
<http://msdn.microsoft.com/workshop/browser/overview/Overview.asp>


_________________________________________________________________


Feedback can be directed to the authors: Will Dormann and Art Manion.

Send mail to <cert@cert.org>.

Please include the Subject line "TA04-315A Feedback VU#842160".

_________________________________________________________________


Copyright 2004 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>

_________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA04-315A.html>

_________________________________________________________________


Revision History

November 10, 2004: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQZJ1mBhoSezw4YfQAQI3iAf+LS3++j7u55GXcK2sKED6gi8ZHTXY/85t
0Z2bsLVkvQYq7FmDMRZR1Id9gGadzbj+FvaCoilAqcfxjNG8MrDwuuZ/w2/F2zLn
ybOsQK5qdIcU7InbVWiWwi4oNSmTkWqtbM4YtYISPRVpvfvgAFKjhGJFGtniu4qa
rGdyqyxmMZnUY47MVyqy1umYPcMeMDExoeLEOCnKfxzxbTdYLz1pKA8Oru/tOGdP
FaLj8S1i041dquKYtNb1dedUL6WlP2sy8hyk4Q+S5R0g0pfsETByNx4IsXJ+3fy3
a6uOqIn0q+ptqZ0Mv2f2XTCAi+tKeCHml1IaowDEBNzEPFi/yP3vOw==
=LS8m
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close