Neuer IE BUG Extremely critical

#0
13.07.2004, 15:16
Member

Beiträge: 1095
#1 Meldung von Secunia Security Advisories Mailinglist

Zitat

Microsoft Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA12048

VERIFY ADVISORY:
http://secunia.com/advisories/12048/

CRITICAL:
Extremely critical

IMPACT:
Security Bypass, Spoofing, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 6
http://secunia.com/product/11/

DESCRIPTION:
Paul has reported some vulnerabilities in Internet Explorer, allowing
malicious people to bypass security restrictions and potentially
compromise a vulnerable system.

1) It is possible to redirect a function to another function with the
same name, which allows a malicious website to access the function
without the normal security restrictions.

Successful exploitation allows execution of arbitrary script code in
the context of another website. This could potentially allow
execution of arbitrary code in other security zones too.

2) Malicious sites can trick users into performing actions like
drag'n'drop or click on a resource without their knowledge. An
example has been provided, which allows sites to add links to
"Favorites". However, resources need not be links and the
destination
could be different than "Favorites".

This issue is a variant of an issue discovered by Liu Die Yu.
SA9711

http-equiv has posted a PoC (Proof of Concept), which combined with
the inherently insecure Windows "shell:" functionality, can
be
exploited to compromise a vulnerable system.

3) It is possible to inject arbitrary script code into Channel links
in Favorites, which will be executed when the Channel is added. The
script code is executed in Local Security Zone context.

4) It is possible to place arbitrary content above any other window
and dialog box using the "Window.createPopup()" function.
This can be
exploited to "alter" the appearance of dialog boxes and
other
windows.

Successful exploitation may potentially cause users to open harmful
files or do other harmful actions without knowing it.

An additional issue allowing malicious sites to inject script into
the Local Security Zone using anchor references has also been
reported to affect Internet Explorer 6 running on Windows XP SP2
(release candidate / beta). This issue could not be confirmed on a
fully patched Windows XP SP1 system.

Issues 1-4 has been confirmed on a fully patched system with Internet
Explorer 6 and Microsoft Windows XP SP1.

Previous versions of Internet Explorer may also be affected.

SOLUTION:
Disable Active Scripting.

Use another product.

PROVIDED AND/OR DISCOVERED BY:
1-3) Discovered by Paul (greyhats).
4) Originally discovered by Georgi Guninski.

OTHER REFERENCES:
SA9711:
http://secunia.com/advisories/9711/
Am besten gefällt mir das. ;)

Zitat

SOLUTION:
Use another product.
Gruß paff
__________
http://www.downclockers.com/ourforum/index.php?board=71.0 Reverse Engineering Malware
Dieser Beitrag wurde am 13.07.2004 um 15:47 Uhr von paff editiert.
Seitenanfang Seitenende
Um auf dieses Thema zu ANTWORTEN
bitte erst » hier kostenlos registrieren!!

Folgende Themen könnten Dich auch interessieren: