Microsoft Internet Explorer MHTML URI Buffer Overflow Vulnerability

Discussion in 'Forum for discussion of ANTICHAT' started by NeMiNeM, 1 Jun 2006.

  1. NeMiNeM

    NeMiNeM Elder - Старейшина

    Joined:
    22 Aug 2005
    Messages:
    480
    Likes Received:
    310
    Reputations:
    201
    Published: May 31 2006 12:00AM
    Updated: Jun 01 2006 06:52PM
    Credit: Discovered by Mr.Niega <[email protected]>.

    Microsoft Internet Explorer is susceptible to a remote buffer-overflow vulnerability in 'INETCOMM.DLL'. The application fails to properly bounds-check user-supplied input data before copying it into an insufficiently sized memory buffer.

    Remote attackers may exploit this issue to crash applications that use the affected library. This includes Internet Explorer, Windows Explorer, and possibly others. Remote code execution may also be possible, but this has not been confirmed.

    The following examples demonstrate this issue. Note that removing the '.url' file may have to be done through 'cmd.exe', since Windows Explorer may crash when attempting to delete the file.
    Examples:
    http://www.securityfocus.com/data/vulnerabilities/exploits/18198.html
    http://www.securityfocus.com/data/vulnerabilities/exploits/18198.url
     
    2 people like this.
  2. Dracula4ever

    Dracula4ever Elder - Старейшина

    Joined:
    8 May 2006
    Messages:
    418
    Likes Received:
    183
    Reputations:
    26
    A very interesting information,10q very much.
    Microsoft Internet Explorer is the worst product of microsoft!
    Fire Fox rulezz!