vendor:
by:
N/A
CVSS
N/A
IE-Object longtype dynamic call overflow
CWE
Product Name:
Affected Version From:
Affected Version To:
Patch Exists:
Related CWE:
CPE:
Platforms Tested: Windows
Proof of concept exploit on IE 5.x – 6.x by Alumni
The exploit takes advantage of a flaw in URLMON.DLL when converting backslashes to wide char. This can be seen on the stack dump near '&CLSID=AAA...2F__2F__...'. The exploit involves starting a server perl script and connecting to the http-service using IE/5.x. The shellcode size is limited up to 56 bytes. The '$ret' and image base of KERNEL32.DLL may differ. The shellcode is given 'as is' with the help of JScript.