There is a vulnerability in the implementation of history.go() function in Internet Explorer 6 exposed via JavaScript. The vulnerability enables the execution of arbitrary code if the user visits a web page controlled by the attacker.
The vulnerability
The vulnerability is in the erroneous implementation of history.go() function when called with a certain argument.
Impact
This vulnerability can be used to achieve remote code execution when a victim visits a specially crafted web page.
PoC
Due to the spread and the impact of the vulnerability, exploiting details will not be released at this time.
References
http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0552
2 comments:
If you are tired of spending a lot of time on useless manual checks of text works, then I would like to advise you website copyright checker. By going to the site, you can start using a cool specialized tool. It will help you to find errors and plagiarism in text works. I use it all the time and I'm happy with the results!
Awsome blog. It's very interesting to read...
Dot Net Training course at Edukators in Coimbatore
Post a Comment