Address Bar Spoofing on Double Byte Character Set Locale Vulnerability (CAN-2004-0844) Patched in MS04-038

From: Liu Die Yu (liudieyu_at_UMBRELLA.NAME)
Date: 11/28/04

  • Next message: Jeff Moss: "Black Hat CFPs now open: Europe and Asia"
    Date:         Sun, 28 Nov 2004 23:55:08 +0800
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Overview
    ========
    On "Double Byte Character Set Locale" systems(Chinese, Japanese, etc),
    there exists a spoofing vulnerability within Microsoft Internet Explorer
    that enables attackers to fake the Address field.

    Exploit
    =======
    http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTime.html

    Patch
    =====
    http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx

    Details
    =======
    The research started when I found:
    Input %fe@umbrella.name in the address field and press ENTER: MSIE will
    go to the homepage of Umbrella.name, but the address field will display
    "http://@umbrella.nam/e". After playing this for several times, I made
    the exploit mentioned above.

    I still do not know the mechanism behind this bug.

    It may be helpful to read the official description of this issue from
    Microsoft TechNet
    -----QUOTE-START-----
    Aspoofing vulnerability exists in Internet Explorer's processing of URLs
    on Double Byte Character Set systems. This vulnerability could result in
    an incorrect URL being listed in the Address bar that is not the actual
    Web page that is displayed by Internet Explorer.
    -----QUOTE-ENDOF-----
    "Aspoofing" - http://www.onelook.com/?w=aspoofing&ls=a
    (
        Look up "Aspoofing" in your English dictionary, then you can learn
    how carefully they prepared this security bulletin.
        To learn more about MSRC, don't miss: A Tour of the Microsoft
    Security Response Center (MSRC)

     http://umbrella.name/originalvuln/msie/DieSlowlyThisTime/DieSlowlyThisTime-msrc_explained.html

    )

    Credit
    ======
    Liu Die Yu - http://umbrella.name/

    Send to Friend
    ==============
    http://editive.com/referrer

    Greetings
    =========
    Drew Copley, Malware, Guninski, Feng4ever, Jelmer, Zhouwei, mom and dad.

    ##### END OF FILE #####

    --
    Editor's Note: The 43rd Most Powerful Person in Networking says...
    Register today to take the TruSecure ICSA exam by 12/31/04  at
    <http://www.2test.com> ,  use promo code "CT1204" and you will pay just
    $221.25 US Dollars for domestic exam delivery and  $296.25 US Dollars
    for international delivery.
    Visit <https://ticsa.trusecure.com>  for complete details regarding the
    TICSA credential and to take the free sample exam.
    --
    

  • Next message: Jeff Moss: "Black Hat CFPs now open: Europe and Asia"

    Relevant Pages