Lucene search

K
certCERTVU:842160
HistoryNov 03, 2004 - 12:00 a.m.

Microsoft Internet Explorer vulnerable to buffer overflow via FRAME and IFRAME elements

2004-11-0300:00:00
www.kb.cert.org
13

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.927 High

EPSS

Percentile

99.0%

Overview

Microsoft Internet Explorer (IE) contains a buffer overflow vulnerability that can be exploited to execute arbitrary code with the privileges of the user running IE.

Description

A heap buffer overflow vulnerability exists in the way IE handles the SRC and NAME attributes of HTML elements such as FRAME and IFRAME. Publicly available exploit code uses JavaScript to prepare the heap by allocating memory with blocks that consist of NOP slides and shell code. After mishandling overly long SRC and NAME attributes, IE dereferences a memory address that may fall within one of the prepared heap blocks, running through the NOP slide and executing the attacker’s shell code. Without the ability to prepare the heap (i.e., without Active scripting), it becomes more difficult for the attacker to execute arbitrary code. Note, however, that an attacker could use techniques other than Active scripting to prepare the heap to more easily execute arbitrary code.

It appears that this vulnerability was discovered using the mangleme tool.

Other programs (e.g., Outlook, Outlook Express, AOL, Lotus Notes) that use the WebBrowser ActiveX control could be affected by this vulnerability.

Based on currently available information, IE 6 on Windows XP SP2 is not vulnerable.


Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Public reports indicate that this vulnerability is used by malicious code called Bofra (also identified as variants of W32/MyDoom).


Solution

Apply a Patch
Apply the patch referenced in MS04-040.


Install Windows XP Service Pack 2 (SP2)

Microsoft Windows XP SP2 is not affected by this vulnerability.

Disable Active scripting

Disabling Active scripting makes it somwehat more difficult for an attacker to prepare the heap to easily execute arbitrary code. At a minimum, disable Active scripting in the Internet zone and the zone used by Outlook, Outlook Express, or any other software that uses the WebBrowser ActiveX control. Instructions for disabling Active scripting can be found in the Malicious Web Scripts FAQ. Note that an attacker may be able to prepare the heap using other techinques, in which case disabling Active scripting would only provides defense against attacks that use Active scripting.

Do not follow unsolicited links

Do not click on unsolicited URLs received in email, instant messages, web forums, or internet relay chat (IRC) channels.

Use current versions of Outlook or Outlook Express

By default, Outlook Express 6, Outlook 2002, and Outlook 2003 use the Restricted Sites Zone to display HTML messages. Because IFRAME and FRAME elements are not rendered in the Restricted Sites Zone, these email clients do not act as attack vectors by default.

Render email in plain text

Configure email client software (mail user agent [MUA]) to render email messages in plain text. Instructions to configure Outlook 2002, Outlook 2003, and Outlook Express 6 are available in Microsoft Knowledge Base Articles 307594, 831607, and 291387, respectively.

Maintain updated antivirus software

Antivirus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely on antivirus software to defend against this vulnerability.


Vendor Information

842160

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: November 03, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23842160 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by ned and SkyLined.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2004-1050
Severity Metric: 63.79 Date Public:

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.927 High

EPSS

Percentile

99.0%