exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

n.runs-SA-2008.008.txt

n.runs-SA-2008.008.txt
Posted Oct 21, 2008
Authored by Thierry Zoller | Site nruns.com

A remote code execution vulnerability exists in Internet Explorer due to accesses to uninitialized memory in certain cases of DTML constructs. As a result, memory may be corrupted in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

tags | advisory, remote, arbitrary, code execution
SHA-256 | 63f11a575a512f09a4c59bdac83e1c1fd7a29a172f4f6cffa5c7ba94519fb9fd

n.runs-SA-2008.008.txt

Change Mirror Download
n.runs AG
https://www.nruns.com/ security(at)nruns.com
n.runs-SA-2008.008 21-October-2008

____________________________________________________________________________

Vendor: Microsoft
Affected Products: Internet Explorer 6
Internet Explorer 7
Windows XP SP2 & SP3
Windows 2000 SP4
Windows 2003 SP1
Vulnerability: Remote Code execution
Risk: High
____________________________________________________________________________


Overview
--------
A remote code execution vulnerability exists in Internet Explorer due to
accesses to uninitialized memory in certain cases of DTML constructs. As
a result, memory may be corrupted in such a way that an attacker could
execute arbitrary code in the context of the logged-on user.

Impact
------
An attacker could exploit the vulnerability by constructing a specially
prepared Website, when a user views the Web page, the vulnerability
could allow remote code execution. An attacker who successfully
exploited this vulnerability could gain the same user rights as the
logged-on user.

Solution
--------
Microsoft has issued an update to correct this vulnerability. More
details can be found at:
https://www.microsoft.com/technet/security/bulletin/MS08-058.mspx

________________________________________________________________________

Vendor communication:

2008/07/07 Thierry sends notification to Microsoft
2008/07/07 Acknowledgement and Receipt
2008/10/14 Microsoft publishes

________________________________________________________________________

Credits
-------
Vulnerability discovered by Thierry Zoller


About n.runs
------------
n.runs AG is a vendor-independent consulting company specializing in the
areas of: IT Infrastructure, IT Security and IT Business Consulting. In
2007, n.runs expanded its core business area, which until then had been
project based consulting, to include the development of high-end
security solutions. Application Protection System - Anti Virus (aps-AV)
is the first high-end security solution that n.runs is bringing to the
market.

Advisories can be found at : https://www.nruns.com/security_advisory.php

Copyright Notice
----------------
Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded.
In no event shall n.runs be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if n.runs has been advised of the possibility of
such damages.

Copyright n.runs AG. All rights reserved. Terms of use apply.

________________________________________________________________________

Subscribe to the n.runs newsletter by signing up to:
https://www.nruns.com/newsletter_en.php
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close