ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [NT] Internet Explorer ActiveX bgColor Property DoS



> -----Original Message-----
> From: SecuriTeam [mailto:support@xxxxxxxxxxxxxx] 
> Sent: Monday, January 29, 2007 12:43 PM
> To: html-list@xxxxxxxxxxxxxx
> Subject: [NT] Internet Explorer ActiveX bgColor Property DoS
> 
> Internet Explorer ActiveX bgColor Property DoS 
> 
> 
> 
> Determina Security Research has discovered a denial of 
> service vulnerability in multiple ActiveX controls included 
> in Internet Explorer. This vulnerability can be exploited by 
> a malicious web page and results in a termination of the 
> Internet Explorer process. Our analysis indicates that remote 
> code execution is unlikely. The vulnerable ActiveX controls 
> are installed by default with all versions of Internet 
> Explorer on Windows 2000, XP, 2003 and Vista. 
> 
> 
> This vulnerability was found by a fuzzer that instantiates 
> all ActiveX controls on the system and enumerates their 
> properties. We discovered multiple controls that crash with 
> an invalid memory access exception when certain object 
> properties are accessed through JavaScript. Most of the 
> vulnerable ActiveX controls are in MSHTML.DLL and are 
> exploitable on all versions of Internet Explorer. Their 
> ProgIDs are given below: 
> 
> giffile 
> htmlfile 
> jpegfile 
> mhtmlfile 
> ODCfile 
> pjpegfile 
> pngfile 
> xbmfile 
> xmlfile 
> xslfile 
> wdpfile 
> 
> The following two controls in TRIEDIT.DLL are exploitable 
> without user interaction only on Internet Explorer 5 and 6: 
> 
> TriEditDocument.TriEditDocument 
> TriEditDocument.TriEditDocument.1 
> 
> Accessing one of the bgColor, fgColor, linkColor, alinkColor, 
> vlinkColor or defaultCharset properties of the controls 
> listed above results in a NULL pointer dereference and an 
> unhandled memory access violation. It is hard to tell what 
> the root cause and full impact of this vulnerability are, but 
> remote code execution seems unlikely at this point. 
> 
> Microsoft has taken steps to minimize the attack surface 
> presented by the ActiveX controls in Internet Explorer 7. The 
> ActiveX Opt-In feature prevents previously unused ActiveX 
> controls from running, unless the user explicitly allows 
> their instantiation. The only controls that can run without 
> prompting the user are the ones included on a pre-approved 
> list in the system registry. All vulnerable MSHTML.DLL 
> controls listed above are on the pre-approved list, allowing 
> the vulnerability to be exploited with no user interaction on 
> IE7 running on both Windows XP and Vista. 
> Proof of Concept: 
> 
> The following .HTML file will trigger the vulnerability: 
> 
> <html> 
> <body> 
>   <script language="JavaScript"> 
>     obj = new ActiveXObject("giffile"); 
>     obj.bgColor; 
>   </script> 
> </body> 
> </html> 
> 
> Opening the file in Internet Explorer results in the 
> following NULL-pointer dereference: 
> 
> (a9c.72c): Access violation - code c0000005 (!!! second chance !!!) 
> eax=00000000 ebx=7ded51fc ecx=01253b90 edx=00000000 
> esi=00038ff8 edi=01253c40 
> eip=7dda1dde esp=0013dfb0 ebp=0013dfbc iopl=0 nv up ei pl nz na pe nc 
> cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 
> mshtml!CDocument::get_bgColor+0x7e: 
> 7dda1dde ff30 push dword ptr [eax] ds:0023:00000000=???????? 
> 
> 
> Additional Information: 
> The information has been provided by Alexander Sotirov 
> <mailto:asotirov@xxxxxxxxxxxxx> . 
> The original article can be found at: 
> http://www.determina.com/security.research/vulnerabilities/act
> ivex-bgcolor.html 
> 
> 



 




Copyright © Lexa Software, 1996-2009.