To: thecow who wrote (37318 ) 10/9/2003 8:03:29 PM From: Elsewhere Respond to of 110631 Internet Explorer vulnerabilities Here's a list of Microsoft Internet Explorer vulnerabilities which I picked up from the following article of a German IT information service: Sicherheitsupdates von Microsoft lassen weiterhin Lücken offen [Microsoft security patches continue to leave open holes]heise.de The article contains a link to the following site: Unpatched IE security holespivx.com The list has been removed on the Web but posted in the discussion thread of the article. Note: some of the linked sites - especially those labeled "exploits" - might be a security risk and/or compromise the PC so try at your own risk. Media bar resource injection Description: Arbitrary file download and execution, by ability to load ressource files in a window object Reference: lists.netsys.com Exploit: ip3e83566f.speed.planet.nl file-protocol proxy Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net NavigateAndFind protocol history Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net window.open search injection Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net NavigateAndFind file proxy Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net Timed history injection Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net history.back method caching Description: cross-domain scripting, cookie/data/identity theft, command execution Reference: safecenter.net Exploit: safecenter.net Click hijacking Description: Pointing IE mouse events at non-IE/system windows Reference: safecenter.net Exploit: safecenter.net Re-evaluating HTML evaluation dataSrc command execution Description: Allows execution of arbitrary commands in Local Zones Detail: This bug is related to the codebase local path bug, but details the actual issue and runs without scripting or ActiveX enabled Published: February 28th 2002 Reference: security.greymagic.com Example exploit: security.greymagic.com Note: See 6th May 2003 Notes. Notes September 2003: Renamed and re-added, symptom fixed instead of problem. Now demonstrates how to reach HTA functionality. Reference: msgs.securepoint.com Example exploit: malware.com Example exploit without scripting: malware.com Temporary workaround: Change the mime-type application/hta to something else ADODB.Stream local file writing Description: Planting arbitrary files on the local file system Exploit: ip3e83566f.speed.planet.nl (but unrelated to the EEye exploit) Notepad popups Description: Opening popup windows without scripting Reference: computerbytesman.com Followup: msgs.securepoint.com Note: This is just an example of the problem, this entry will be replaced when more material is published protocol control chars Description: Circumventing content filters Reference: badwebmasters.net Exploit: badwebmasters.net WMP local file bounce Description: Switching security zone, arbitrary command execution, automatic email-borne command execution Reference: ntbugtraq.com Exploit: malware.com !.html HTTP error handler Local Zone XSS Description: HTML/Script injection in the Local Zone Reference: sec.greymagic.com Exploit: sec.greymagic.com XSS in Unparsable XML Files Description: Cross-Site Scripting on any site hosting files that can be misrendered in MSXML Reference: sec.greymagic.com Exploit: sec.greymagic.com Alexa Related Privacy Disclosure Description: Unintended disclosure of private information when using the Related feature Reference: secunia.com Reference: imilly.com Basic Authentication URL spoofing Description: Spoofing the URL displayed in the Address bar Reference: msgs.securepoint.com DNSError folder disclosure Description: Gaining access to local security zones Reference: msgs.securepoint.com mhtml wecerr CAB flip Description: Delivery and installation of an executable Reference: msgs.securepoint.com WebFolder data Injection Description: Injecting arbitrary data in the My Computer zone Reference: msgs.securepoint.com codebase local path Description: Allows execution of arbitrary commands in Local Zones Hinted: June 25th 2000 by Dildog Reference: online.securityfocus.com Hinted: November 23rd 2000 by Georgi Guninski Reference: guninski.com Published: January 10th 2002, by thePull (incorrectly labeled the "Popup object" vulnerability) Reference: home.austin.rr.com Example exploit: home.austin.rr.com Note: See 6th May 2003 Notes. Web Archive buffer overflow Description: Possible automated code execution. Reference: msgs.securepoint.com dragDrop invocation Description: Arbitrary local file reading through native Windows dragDrop invocation. Reference: msgs.securepoint.com Exploit: kuperus.xs4all.nl document.domain parent DNS resolver Description: Improper duality check leading to firewall breach Published: July 29 2002 Reference: online.securityfocus.com FTP Folder View XSS Description: Elevating privileges, running script in the My Computer zone, arbitrary command execution, etc. Published: June 7th 2002 (Microsoft was notified December 21st 2001.) Reference: geocities.co.jp Exploit: jscript.dk DynSrc Local File detection Description: Detect if a local file exists, and read its size/date Published: March 27th 2002 Reference: security.greymagic.com Status: Patched in IE6 by IE6 Service Pack 1, but IE5 and 5.5 are still vulnerable. Security zone transfer Description: Automatically opening IE + Executing attachments Published: March 22nd 2002 Reference: security.greymagic.com Extended HTML Form Attack Description: Cross Site Scripting through non-HTTP ports, stealing cookies, etc. Published: February 6th 2002 Reference: eyeonsecurity.org "script src" local file enumeration Description: Enables a malicious programmer to detect if a local file exists. Published: January 3rd 2002 Reference: securityfocus.com Example exploit: jscript.dk IE https certificate attack Description: Undetected SSL man-in-the-middle attacks, decrypting SSL-encrypted traffic in realtime Published: December 22 2001 (Stefan Esser) Published: June 6 2000 (ACROS) Reference: security.e-matters.de Example exploit: suspekt.org Status: Initially fixed in IE4 and early IE5s by MS00-039, re-introduced by a later patch.