{"id":18,"date":"2006-10-04T06:46:00","date_gmt":"2006-10-04T15:46:00","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=18"},"modified":"2007-01-23T13:17:31","modified_gmt":"2007-01-23T22:17:31","slug":"zero-day-exploit-alert-webviewfoldericon-setslice-vulnerability","status":"publish","type":"post","link":"https:\/\/www.evardsson.com\/blog\/2006\/10\/04\/zero-day-exploit-alert-webviewfoldericon-setslice-vulnerability\/","title":{"rendered":"Zero-Day Exploit Alert: WebViewFolderIcon setSlice Vulnerability"},"content":{"rendered":"<p>This is a Critical exploit, capable of executing code as the user running Internet Explorer. Reports of this in the wild as well as a temporary <a href=\"http:\/\/handlers.sans.org\/tliston\/WEBVW.DLL_KillBit.exe\">patch<\/a>  can be found at the <a href=\"http:\/\/isc.sans.org\/diary.php?storyid=1742\">Internet Storm Center<\/a>.<br \/>\nFrom the <a href=\"http:\/\/research.eeye.com\/html\/alerts\/AL20061002.html\">eEye Digital Security Alert<\/a>:<\/p>\n<blockquote><p>The PoC is an integer overflow-based heap overflow, in the DSA_SetItem function in COMCTL32.DLL. An arithmetic overflow can occur during multiplication to calculate the desired size for a call to ReAlloc, that isn&#8217;t reproduced during a subsequent call to memmove, so the allocated size can be smaller than the copy size and result in a heap buffer overflow. &#8230;<\/p>\n<p>This vulnerability can result in remote code execution in the context of the logged in user. In order to exploit this an attacker must create a malicious website or leverage a site that allows for custom user content.<\/p><\/blockquote>\n<p>While the vulnerability was posted on the <a href=\"http:\/\/browserfun.blogspot.com\/2006\/07\/mobb-18-webviewfoldericon-setslice.html\">Browser Fun Blog<\/a> on July 18th, the exploit first appeared over the weekend. The <a href=\"http:\/\/www.microsoft.com\/technet\/security\/advisory\/926043.mspx\">Microsoft Security Advisory<\/a> has details on how to patch manually and how to apply the manual change to group policy.<\/p>\n<p><strong>Affects:<\/strong><\/p>\n<ul>\n<li> Windows 2000 Service Pack 4<\/li>\n<li> Windows XP Service Pack  1<\/li>\n<li> Windows XP Service Pack 2<\/li>\n<li> Windows Server  2003<\/li>\n<li> Windows Server 2003 Service Pack 1<\/li>\n<li> Windows XP  Professional x64 Edition<\/li>\n<li> Windows Server 2003 for Itanium-based  Systems<\/li>\n<li> Windows Server 2003 with SP1 for Itanium-based  Systems<\/li>\n<li> Windows Server 2003 x64 Edition<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This is a Critical exploit, capable of executing code as the user running Internet Explorer. Reports of this in the wild as well as a temporary patch can be found at the Internet Storm Center. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10,20],"tags":[147,157],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pxT7i-i","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":0,"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/posts\/18\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/media?parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/categories?post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.evardsson.com\/blog\/wp-json\/wp\/v2\/tags?post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}