Home Forums Classifieds GT Store Blogs Today's Posts Search Social Groups


Glock Talk
Welcome To The Glock Talk Forums.

Thread Tools Display Modes
Old 07-13-2004, 16:07   #1
Senior Member
nigneil146's Avatar
Join Date: May 2003
Location: Pennsylvania
Posts: 674
4 New "Extremely Critical" IE Vunerabilities and 9 Windows Patches

From Slashdot:


"Buckle your seat belts folks. On what is looking to be the next Black Tuesday, with rumors of 9 new Windows security patches being released, Secunia is reporting on 4 new vulnerabilities in IE that allow for arbitrary code execution and placing content over other windows. Combined with the new Windows patches, it is likely more Download.Ject and Sasser like viruses will be emerging in the coming months."

From Secunia:


"Paul has reported some vulnerabilities in Internet Explorer, allowing malicious people to bypass security restrictions and potentially compromise a vulnerable system.

1) It is possible to redirect a function to another function with the same name, which allows a malicious website to access the function without the normal security restrictions.

Successful exploitation allows execution of arbitrary script code in the context of another website. This could potentially allow execution of arbitrary code in other security zones too.

2) Malicious sites can trick users into performing actions like drag'n'drop or click on a resource without their knowledge. An example has been provided, which allows sites to add links to "Favorites". However, resources need not be links and the destination could be different than "Favorites".

This issue is a variant of an issue discovered by Liu Die Yu.

http-equiv has posted a PoC (Proof of Concept), which combined with the inherently insecure Windows "shell:" functionality, can be exploited to compromise a vulnerable system.

3) It is possible to inject arbitrary script code into Channel links in Favorites, which will be executed when the Channel is added. The script code is executed in Local Security Zone context.

4) It is possible to place arbitrary content above any other window and dialog box using the "Window.createPopup()" function. This can be exploited to "alter" the appearance of dialog boxes and other windows.

Successful exploitation may potentially cause users to open harmful files or do other harmful actions without knowing it.

An additional issue allowing malicious sites to inject script into the Local Security Zone using anchor references has also been reported to affect Internet Explorer 6 running on Windows XP SP2 (release candidate / beta). This issue could not be confirmed on a fully patched Windows XP SP1 system.

Issues 1-4 has been confirmed on a fully patched system with Internet Explorer 6 and Microsoft Windows XP SP1.

Previous versions of Internet Explorer may also be affected."

Also check out this page for many, many more vunerabilities.

Secuia Homepage
nigneil146 is offline   Reply With Quote
Old 07-15-2004, 16:11   #2
Senior Member
younggenious's Avatar
Join Date: Jun 2001
Location: Southern TX
Posts: 1,874

I don't even know how to feel anymore...

Long ago did I get sick of Microsoft's bad and insecure coding practices.
younggenious is offline   Reply With Quote


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

All times are GMT -6. The time now is 11:55.

GT Wiki
GT Blogs
Social Groups
GT Store

Users Currently Online: 906
249 Members
657 Guests

Most users ever online: 4,867
May 19, 2015 at 1:03