File: 100000118.txt

package info (click to toggle)
snort 2.9.2.2-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 53,752 kB
  • sloc: ansic: 214,625; sh: 13,872; makefile: 2,574; yacc: 505; perl: 496; lex: 260; sql: 213; sed: 14
file content (69 lines) | stat: -rw-r--r-- 1,299 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Rule: 

--
Sid: 
100000118

-- 
Summary: 
This event is generated when an attempt is made to exploit a buffer overflow 
present in Internet Explorer's urlmon.dll file.

-- 

Impact: 
An attacker may execute arbitrary commands with the privileges of the user 
running Internet Explorer.

--
Detailed Information:
If a web server sends data with a Content-Type value of 300 or more bytes, a 
buffer overflow is triggered, and commands may be executed with the privileges 
of the user running Internet Explorer.

--
Affected Systems:
Internet Explorer 5.0.1
Internet Explorer 5.0.1 SP1
Internet Explorer 5.0.1 SP2
Internet Explorer 5.0.1 SP3
Internet Explorer 5.5
Internet Explorer 5.5 SP1
Internet Explorer 5.5 SP2
Internet Explorer 6.0
Internet Explorer 6.0 SP1

--

Attack Scenarios: 
An attacker must entice a user to click on a link to a properly configured 
server, which will return the necessary data.

-- 

Ease of Attack: 
Medium. An attacker must control a properly configured web server, and entice 
users to click on a link to that server.

-- 

False Positives:
None Known.

--
False Negatives:
None Known.

-- 

Corrective Action: 
Apply the latest patches for Internet Explorer from Microsoft.com.

--
Contributors: 
Alex Kirk <alex.kirk@sourcefire.com>

-- 
Additional References:

--