Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Sandblad's IE vulnerabilities
From: "Lise Moorveld" <lise_moorveld () hotmail com>
Date: Fri, 18 Feb 2005 14:27:28 +0100

Hi there,

Did you guys spot this? Three vulnerabilities in IE that lead to remote code execution when combined. Discovered by Andreas Sandblad, apparently fixed by the latest cumulative IE patch (MS05-014), but not confirmed by MS.

http://secunia.com/secunia_research/2004-8/advisory/

I do miss his personal advisories, with the cute ascii-figure in his .sig:
     _     _
   o' \,=./ `o
      (o o)
---ooO--(_)--Ooo---   (c) Sandblad

But above all, I miss the detailed description... the patches are out, I should hope everybody installed them by now, so where is the meat?

What do you guys make from it?

For example:
"A parsing error in the "codebase" attribut of the "object" tag.
This can be exploited to execute local files with any file extension
from the "Local Computer Zone" by appending "?.exe"."

Would this be limited to binary files, or would one be able to parse an HTML file containing some malicious javascript with this vulnerability? Perhaps its related to the codebase vulnerabilities reported some time ago...

http://archives.neohapsis.com/archives/bugtraq/2003-05/0059.html

Bye,

Lise

_________________________________________________________________
MSN Search, for accurate results! http://search.msn.nl

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
  • Sandblad's IE vulnerabilities Lise Moorveld (Feb 19)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault