Posted to PENGUIN BBS 09/21 Tue 07:42:42 Name : L Title : location.replace() overflow exploit URL : http://layer.webprovider.com/ Contact : phyx@i.am --- Internet Explorer has buffer overflow bug on "location.replace()". If the long string is specified at argument of "location.replace()", buffer overflow will happen. Platform Windows Application Internet Explorer Confirmed version 5.00.2314.1003 Fixed version None Type buffer overflow Exploitable Yes Reappearance by remote Yes Defense Disable active scripting For example: At GPF dialogbox, EIP will be 0x00610061 in this case. JScript is using Unicode for internal character set. Code of 'a' is 0x61 in ASCII. But, in Unicode, code of 'a' is 0x0061. We must use Unicode to exploit this bug. For example: Now, we can set EIP freely. Exploit sample that executes notepad.exe for Japanese Windows 98: