SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Microsoft Internet Explorer (IE) Vendors:   Microsoft
Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015251
SecurityTracker URL:  http://securitytracker.com/id/1015251
CVE Reference:   CVE-2005-1790   (Links to External Site)
Updated:  Dec 13 2005
Original Entry Date:  Nov 22 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.01 SP4, 5.5 SP2, 6 SP1; and prior service packs
Description:   A vulnerability was reported in Microsoft Internet Explorer. A remote user may be able to cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will cause arbitrary code to be executed on the target system. The code will run with the privileges of the target user.

HTML that contains certain javascript onload() events can trigger the flaw. The vulnerability occurs due to way that Internet Explorer handles mismatched Document Object Model (DOM) objects. Other events may be affected.

Exploit code is publicly available and malicious software is actively exploiting this vulnerability.

This vulnerability was originally reported by Benjamin Tobias Franz in May 2005 as a denial of service vulnerability. In that report, the following demonstration exploit was provided:

<body onLoad="window()">

Impact:   A remote user can create HTML that, when loaded by the target user, will cause arbitrary code to be executed on the target user's system.
Solution:   The vendor has issued the following fixes:

Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=4005B74A-D6E6-4A32-A3B1-276686B4A428

Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 or on Microsoft Windows XP Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A8443CD2-D98D-427B-9F0E-BD7E19FCB994

Internet Explorer 6 for Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=E4B5BA57-D4F2-4798-9154-2869E371C9D1

Internet Explorer 6 for Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=9D70FB20-C7C9-43AF-A864-6DBC9A542CC6

Internet Explorer 6 for Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=1EE790B9-E596-4344-AEC3-FCB3289D7E9C

Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=8E9C23E5-7988-42DA-A8BD-2C1A534BF995

Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=E1652B4A-6339-4B31-8ACF-D2A844C24F70

A restart is required.

This fix is part of a cumulative update that supercedes the update provided in MS05-052.

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms05-054.mspx (Links to External Site)
Cause:   State error
Underlying OS:   Windows (98), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Tue, 22 Nov 2005 00:46:21 -0500
Subject:  Microsoft Security Advisory (911302); Vulnerability in the way Internet Explorer Handles onLoad Events Could Allow Remote Code Execution


http://www.microsoft.com/technet/security/advisory/911302.mspx
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC