DESCRIPTION

Internet Explorer is the flagship browser for the Microsoft Windows OS.

SUMMARY

PRODUCT Internet Explorer
VENDOR Microsoft
AFFECTED VERSIONS 5.x up to SP3 inclusive, up to 6.1 SP1 inclusive
SEVERITY HIGH
IDENTIFIER N/A
TESTED PLATFORM Windows 2k, Windows XP

A vulnerability has been discovered in IE5.x and IE6.x that allows an attacker to effectively corrupt the allocated memory space and cause IE to crash upon successful exploitation. Microsoft later acknowledged the issue and confirmed the vulnerability is an exploitable heap overflow vulnerability which ultimately gives an attacker the luxury to execute arbitrary code against IE users.

IMPACT

Execute Arbitrary Code

DETAILS

[Vulnerability] Cascading Style Sheets(CSS) Memory Corruption

Cascading Style Sheets (CSS) is a technology that allows Web authors to have increased control of the design and interaction of their Web pages. The issue arises when IE is presented a STYLE tag followed by a sequence of comment character /* that is not terminated, which triggers IE to perform an invalid memory copy operation, for example:

<STYLE>@;/*

The attacker can simply cause a Denial of Service and crash the vulnerable IE versions by constructing a malicious web page that has the <STYLE>@;/*embedded. The attacker needs to use merely 11 bytes to crash a 20mb software package.

PROOF OF CONCEPT

For demonstration purposes, we also construct a sample page here http://www.ecqurity.com/adv/11.html (visiting 11.html will crash your IE without any warning, make sure you save whatever you're doing first before visiting the page). Additionally, a more sophisticated exploit can also be crafted to have the malicious code executed in the context of the IE user whenever the malicious web page is loaded. For the exploit to work, the attacker only needs to entice the users to visit the malicious page.

VENDOR STATUS

Microsoft acknowledged the issue and released a patch on the October 12th, 2004. For more information about the patch and where you can download it, please visit http://www.microsoft.com/technet/security/bulletin/ms04-038.mspx

CREDIT

Phuong Nguyen -- phuong at ecqurity . com

David Coomber -- david at ecqurity . com

DISCLOSURE TIMELINE

N/A

APPENDIX

N/A

REFERENCES

N/A