Wednesday, April 15, 2009

Internet Explorer 6 history.go() Remote Code Execution

There is a vulnerability in the implementation of history.go() function in Internet Explorer 6 exposed via JavaScript. The vulnerability enables the execution of arbitrary code if the user visits a web page controlled by the attacker.

The vulnerability

The vulnerability is in the erroneous implementation of history.go() function when called with a certain argument.

Impact

This vulnerability can be used to achieve remote code execution when a victim visits a specially crafted web page.

PoC

Due to the spread and the impact of the vulnerability, exploiting details will not be released at this time.

References

http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0552

2 comments:

DarenTill said...

If you are tired of spending a lot of time on useless manual checks of text works, then I would like to advise you website copyright checker. By going to the site, you can start using a cool specialized tool. It will help you to find errors and plagiarism in text works. I use it all the time and I'm happy with the results!

Priya said...

Awsome blog. It's very interesting to read...

Dot Net Training course at Edukators in Coimbatore