Microsoft Internet Explorer 模态对话框操纵漏洞

漏洞信息详情

Microsoft Internet Explorer 模态对话框操纵漏洞

漏洞简介

当在安全设置中配置提示符时,Windows XP Service Pack 2和Windows Server 2003 Service Pack 1之前版本中的IE浏览器使用模态对话框验证用户是否要运行ActiveX控件或执行其他有风险操作。这使得用户辅助攻击者可以造成竞争状态,从而欺骗用户点击某一对象或按下实际上应用到用于执行控件的\”确定\”按键。

漏洞公告

参考网址

来源: MISC

链接:http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/

来源: BID

名称: 17713

链接:http://www.securityfocus.com/bid/17713

来源: OSVDB

名称: 22351

链接:http://www.osvdb.org/22351

来源: VUPEN

名称: ADV-2006-1559

链接:http://www.frsirt.com/english/advisories/2006/1559

来源: MISC

链接:http://student.missouristate.edu/m/matthew007/advisories.asp?adv=2006-02

来源: SECTRACK

名称: 1015720

链接:http://securitytracker.com/id?1015720

来源: VULNWATCH

名称: 20060427 PoC for Internet Explorer Modal Dialog Issue

链接:http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0019.html

来源: FULLDISC

名称: 20060426 Internet Explorer User Interface Races, Redeux

链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0759.html

来源: FULLDISC

名称: 20040407 Race conditions in security dialogs

链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html

来源: XF

名称: ie-modal-dialog-code-execution(26111)

链接:http://xforce.iss.net/xforce/xfdb/26111

来源: FULLDISC

名称: 20060427 PoC for Internet Explorer Modal Dialog Issue

链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045589.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享