Internet Explorer 浏览器解释冲突 访问控制绕过漏洞

漏洞信息详情

Internet Explorer 浏览器解释冲突 访问控制绕过漏洞

漏洞简介

Internet Explorer与Mozilla, Opera和Firefox等其他web浏览器之间存在解释冲突。远程攻击者借助可由 Internet Explorer剥离以表现可读文字而在使用其他浏览器时无法进行的,包含第8位组的ASCII字符,来修改网页的视觉表现,并可能绕过内容过滤器等保护机制。

漏洞公告

厂商已经发布补丁以解决此问题及其他问题。

New Atlanta BlueDragon Server J2EE 6.2.1 .286

临时解决方法:

* 配置ACL限制非授权用户对Web接口的访问。

目前厂商已经发布了相关补丁,请到厂商的主页下载:

New Atlanta BlueDragon Server J2EE 6.2.1 .286

New Atlanta BlueDragon.J2EE.309.zip

ftp://ftp.newatlanta.com/public/bluedragon/6_2_1_302/patches/309/BlueD ragon.J2EE.309.zip

New Atlanta BlueDragon Server 6.2.1 .286

New Atlanta BlueDragon.Server.309.zip

ftp://ftp.newatlanta.com/public/bluedragon/6_2_1_302/patches/309/BlueD ragon.Server.309.zip

New Atlanta BlueDragon Server JX 6.2.1 .286

New Atlanta BlueDragon.JX.309.zip

ftp://ftp.newatlanta.com/public/bluedragon/6_2_1_302/patches/309/BlueD ragon.JX.309.zip

参考网址

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438154/100/0/threaded

来源:MISC

链接:http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/

来源:MISC

链接:http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2

来源:OSVDB

链接:http://www.osvdb.org/28376

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438051/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438359/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438066/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438163/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438049/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/437948/100/0/threaded

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/438358/100/0/threaded

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/27288

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享