vendor:
Internet Explorer
by:
John Page (aka hyp3rlinx)
7.5
CVSS
HIGH
Denial Of Service
476
CWE
Product Name: Internet Explorer
Affected Version From: Internet Explorer 11.371.16299.0
Affected Version To: Internet Explorer 11.371.16299.0
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:internet_explorer:11.371.16299.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10
2019
Microsoft Internet Explorer (Win 10) Denial of Service
Microsoft Internet Explorer (Win 10) is vulnerable to a Denial of Service (DoS) attack due to a null pointer de-reference (read) when MSIE encounters an specially crafted HTML HREF tag containing an empty reference for certain Windows file types. Upon IE crash it will at times daringly attempt to restart itself, if that occurs and user is prompted by IE to restore their browser session, then selecting this option so far in my tests has shown to repeat the crash all over again. This can be leveraged by visiting a hostile webpage or link to crash an end users MSIE browser. Referencing some of the following extensions .exe:, .com:, .pif:, .bat: and .scr: should produce the same.
Mitigation:
Microsoft has not released a patch for this vulnerability. As a workaround, users should avoid clicking on malicious links or visiting untrusted websites.