Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution

2006-08-14T13:32:23
ID OSVDB:31329
Type osvdb
Reporter Martin Johns(johns@informatik.uni-hamburg.de)
Modified 2006-08-14T13:32:23

Description

Vulnerability Description

Microsoft Internet Explorer contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate its DNS cache that determines the security context of a domain. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and a specified intranet server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Disable JavaScript.

Short Description

Microsoft Internet Explorer contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate its DNS cache that determines the security context of a domain. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and a specified intranet server, leading to a loss of integrity.

References:

Vendor URL: http://www.microsoft.com Mail List Post: http://www.securityfocus.com/archive/1/443209/30/0/threaded Mail List Post: http://shampoo.antville.org/stories/1451301/ Keyword: DNS pinning Generic Informational URL: http://ha.ckers.org/blog/20060815/circumventing-dns-pinning-for-xss/ CVE-2006-4560