MS and the new IE vulnerability – Object Tag

Keep on Guard!


Can you see the irony?
Just after 2 weeks that M$ released the Internet Explorer security makeover, Michal Zalewski came up with a highly critical exploit, as called by Secunia… based on a mishandling of the OBJECT tag….

Security alerts aggregator Secunia flagged the issue as “highly critical” and stressed that it can be exploited to corrupt memory by tricking a user into visiting a malicious Web site. “Successful exploitation allows execution of arbitrary code,” Secunia warned.

Of course M$ didn’t just sit around… they blamed Michal Zalewski for publishing the vulnerability prior of noticing M$ so they could launch a patch [again?] for it…

Microsoft chided Zalewski for jumping the gun and posting his findings before a comprehensive patch could be created, but the researcher is unapologetic.

And how expected Zalewski striked back:

[They] often attempt to downplay threats; they don’t participate in the vulnerability research community in a meaningful way; and they routinely use false pretenses when communicating their expectations to the media (for example, expressing concern for the customer and blaming the researcher where the chief risk for the customer arises from the fact that an extremely wealthy and profitable software giant severely underfunds the task of fixing critical defects in their software)

Researchers at Websense Security Labs said there are no published proof-of-concepts demonstrating a remote code execution attack vector but made it clear that browser crash vulnerabilities often lead to remote code execution exploits.
But a quick search on SecurityFocus proved something else:
http://www.securityfocus.com/archive/1/431796/30/30/threaded

Source: Microsoft Rocked by New IE Zero-Day Flaw Warning

Posted in: Exploits/Vulnerabilities

, , , , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


3 Responses to MS and the new IE vulnerability – Object Tag

  1. Richard Harlos April 26, 2006 at 1:54 pm #

    It just boggles my mind how incompetent Microsoft has been in their handling of security issues. I switched to the Firefox browser and am very glad that I did. Granted, I cannot access some Microsoft-technology-specific content but this, to me, is a small price to pay for speed, stability, security, etc.

    I enjoy your blog, by the way; keep up the good work!

  2. Darknet April 27, 2006 at 2:41 am #

    Richard: I agree, they are just a ruthless business, they use every dirty trick in the book (monopolising, anti-competitive behaviour, crushing or buying out any upcoming competition etc). They have never considered quality or security an important issue. I’ve been using Firefox for quite a long time and there are very few sites that I find IE specific now, you can always use IETab extension though for those rare occasions or View in IE extension.

    Thanks, I’m glad you enjoy it and don’t worry, we’ll keep posting :)

  3. Dave April 27, 2006 at 10:47 am #

    At the dizzying rate that these vulnerabilities are discovered it’s a wonder that people still make use of IE. Now, I’m not a Firefox evangelist but, c’mon folks. I’m at a loss for a clear understanding of why people don’t more off IE other than the fear of something new.