Posted to PENGUIN BBS 09/21 Tue 07:42:42
Name : L
Title : location.replace() overflow exploit
URL : http://layer.webprovider.com/
Contact : phyx@i.am
---
Internet Explorer has buffer overflow bug on "location.replace()".
If the long string is specified at argument of "location.replace()", buffer overflow will happen.
Platform Windows
Application Internet Explorer
Confirmed version 5.00.2314.1003
Fixed version None
Type buffer overflow
Exploitable Yes
Reappearance by remote Yes
Defense Disable active scripting
For example:
At GPF dialogbox, EIP will be 0x00610061 in this case.
JScript is using Unicode for internal character set.
Code of 'a' is 0x61 in ASCII.
But, in Unicode, code of 'a' is 0x0061.
We must use Unicode to exploit this bug.
For example:
Now, we can set EIP freely.
Exploit sample that executes notepad.exe for Japanese Windows 98: