TUCoPS :: Browsers :: expl5323.htm

Internet Explorer remote buffer overflow via XBM graphics
2nd May 2002 [SBWID-5323]
COMMAND

	IE remote buffer overflow via XBM graphics

SYSTEMS AFFECTED

	IE 6.0

PROBLEM

	Adam Baszczyk [http://www.mykakee.com] [http://www.sztolnia.pl] says :
	

	Internet Explorer [only 6.0] allows the usage of XBM graphic  files  and
	tries to display them whenever they\'re used in any HTML  file  [as  IMG
	tag] or when attached to an e-mail.
	

	XBM structure is very easy it is a text  file  with  C-like  syntax  and
	f.ex. looks like
	

	#define picture_width ?? // picture width

	#define picture_height ?? // picture width height

	static unsigned char picture_bits[] = { //hex picture data

	  );

	

	IE doesn\'t check properly the content of XBM files and  you  may  force
	the browser/e-mail client to hang up that will end up  in  their  silent
	exit because of the Access Violation exception [as shown  with  a  great
	help of windbg, it is generated inside mshtml.dll].
	

	IE doesn\'t check the width and height of the image, so  you  may  write
	whatever you want and IE will try to interprete it, trying  to  allocate
	enough memory for an oversized buffer.
	

	When previewed f.ex. in Outlook  Express,  malformed  e-mail  may  force
	this client to exit (and others that rely on IE).
	

	For an example of such malformed e-mail download one  from  my  homepage
	and try to open by clicking it in Windows Explorer.
	

	http://www.sztolnia.pl/hack/xbmbug/xbmbug.eml

	

	Don\'t forget to run OE first :)

SOLUTION

	??

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH