Bugtraq mailing list archives
SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability
From: Aditya K Sood <zeroknock () secniche org>
Date: Thu, 16 Aug 2007 20:36:58 -0700
Advisory : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability
Dated : 15 August 2007 Severity : Critical Explanation :The vulnerability persists in the popup blocker functioning to allow specific websites to execute popup in the running instance of Internet Explorer. An attacker can easily exploits it by enabling a browser to run a malicious script in the context of Internet Explorer. The script manipulates the registry entries for specific websites through Javascript. It adds fake or malicious websites as an allowed websites in the pop up blocker. The cause user visiting a untrusted website or any othe
malicious cause. Detail Advisory : http://www.secniche.org/advisory/Internet_Pop_Phish_Dos_Adv.pdf http://www.secniche.org/adv.html Proof of Concept : Level 1 Infection Test http://www.secniche.org/misc/ie_pop_by_level1_test.zipTest run fine locally as well with Web server [IIS] automated server object calling. Infection
through Active X Object. Regards AKS aka 0kn0ck http://www.secniche.org
Current thread:
- SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability Aditya K Sood (Aug 15)