Full Disclosure mailing list archives
RE: MSIE (mshtml.dll) OBJECT tag vulnerability
From: <0x80 () hush ai>
Date: Sun, 23 Apr 2006 20:40:23 -0700
OH NOES! Paul Nickerson doesn't approve. Who the fuck is Paul Nickerson? Better yet who cares. On Sun, 23 Apr 2006 17:34:02 -0700 Paul Nickerson <pvnick () gmail com> wrote:
Confirmed on IE 7 beta 2 on Windows XP SP2 For the record, I don't approve of your disclosure practices, Mr. Zalewski, but good work none-the-less. Paul -----Original Message----- From: full-disclosure-bounces () lists grok org uk [mailto:full-disclosure-bounces () lists grok org uk] On Behalf Of Ben Lambrey Sent: Sunday, April 23, 2006 12:17 PM To: full-disclosure () lists grok org uk Subject: Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability On Sunday 23 April 2006 01:30, Michal Zalewski wrote:Perhaps not surprisingly, there appears to be a vulnerability in
howMicrosoft Internet Explorer handles (or fails to handle) certain combinations of nested OBJECT tags. This was tested with MSIE 6.0.2900.2180.xpsp.040806-1825 and mshtml.dll 6.00.2900.2873 xpsp_sp2_gdr.060322-1613. At first sight, this vulnerability may offer a remote compromise
vector,although not necessarily a reliable one. The error is convoluted
anddifficult to debug in absence of sources; as such, I cannotoffer adefinitive attack scenario, nor rule out that my initialdiagnosis will beproved wrong [*]. As such, panic, but only slightly. Probably the easiest way to trigger the problem is as follows: perl -e '{print "<STYLE></STYLE>\n<OBJECT>\nBork\n"x32}' test.html ...this will (usually) cause a NULL pointer + fixed offset(eax+0x28)dereference in mshtml.dll, the pointer being read from allocated
but stillzeroed memory region. The aforementioned condition is not exploitable, but padding the
page withpreceeding OBJECT tag (and other tags), increasing the number of
nestedOBJECTs, and most importantly, adding bogus 'type=' parametersof variouslength to the final sequence of OBJECTs, will cause thatdereference tobecome non-NULL on many installations; then, a range of otherinterestingfaults should ensue, including dereferences of variable bogusaddressesclose to stack, or crashes later on, when the page is reloadedor closed.[ In absence of sources, I do not understand the preciseunderlyingmechanics of the bug, and I am not inclined to spend hourswith adebugger to find out. I'm simply judging by the symptoms, buttheseseem to be indicative of an exploitable flaw. ] Several examples of pages that cause distinct faults in my setup
(yourmileage may and probably WILL vary; on three test machines, this
worked asdescribed; on one, all examples behaved in non-exploitable 0x28way):http://lcamtuf.coredump.cx/iedie2-1.html (eax=0x0, instantdereference)http://lcamtuf.coredump.cx/iedie2-2.html (bogus esi onreload/leave)http://lcamtuf.coredump.cx/iedie2-3.html (page fault onbrowser close)http://lcamtuf.coredump.cx/iedie2-4.html (bogus esi onreload/leave)Well, that's it. Feel free to research this further. Thisvulnerability,as requested by customers, is released in strict observance ofthe PatchWednesday & Bug Saturday policy.IE 6 on Windows 2003+SP1 also crashes. IE version: 6.0.3790.1830 mshtml.dll version 6.0.3790.2666 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.385 / Virus Database: 268.4.5/322 - Release Date: 4/22/2006 -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.1.385 / Virus Database: 268.4.5/322 - Release Date: 4/22/2006 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- MSIE (mshtml.dll) OBJECT tag vulnerability Michal Zalewski (Apr 22)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability Matthew Murphy (Apr 22)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability Ben Lambrey (Apr 23)
- RE: MSIE (mshtml.dll) OBJECT tag vulnerability Paul Nickerson (Apr 23)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability KF (lists) (Apr 23)
- RE: MSIE (mshtml.dll) OBJECT tag vulnerability Michal Zalewski (Apr 24)
- RE: MSIE (mshtml.dll) OBJECT tag vulnerability Paul Nickerson (Apr 23)
- <Possible follow-ups>
- RE: MSIE (mshtml.dll) OBJECT tag vulnerability 0x80 (Apr 23)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability ipatches (Apr 24)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability Sol Invictus (Apr 24)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability Dave "No, not that one" Korn (Apr 25)
- Re: Re: MSIE (mshtml.dll) OBJECT tag vulnerability Valdis . Kletnieks (Apr 25)
- Re: Re: MSIE (mshtml.dll) OBJECT tag vulnerability Raoul Nakhmanson-Kulish (Apr 25)
- Re: Re: MSIE (mshtml.dll) OBJECT tag vulnerability Valdis . Kletnieks (Apr 25)
- Re: Re: MSIE (mshtml.dll) OBJECT tag vulnerability Raoul Nakhmanson-Kulish (en) (Apr 25)
- Re: MSIE (mshtml.dll) OBJECT tag vulnerability Sol Invictus (Apr 24)
- Re: Re: MSIE (mshtml.dll) OBJECT tag vulnerability Javor Ninov (Apr 26)