Buffer Overflow in WideChapter Browser

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Buffer Overflow in WideChapter Browser


Advisory Information:
=====================
Application: WideChapter Browser 
Vendor Homepage: http://www.widechapter.com
Versions: 3.0 (and earlier versions)
Platforms: Windows (all) 
Severity: High
Date: 12.09.03


Introduction:
=============
"WideChapter is the most powerful multi Chapter multi tab web browser. WideChapter is a stable, fast, user-friendly browser. WideChapter gives each web site its own tab! 
WideChapter runs under Windows 98, NT4, ME, 2000 and XP and requires that IE is installed. WideChapter is a standalone browser application that uses services provided by Microsoft Internet Explorer to navigate HTML. WideChapter currently requires Internet Explorer 5.5/above to be installed on the client computer."


Details:
========
Vulnerability: It is possible to cause a Buffer overflow in WideChapter Browser by sending long http request, allowing total modification of the EIP pointer - this can be maliciously altered to allow remote arbitrary code execution.
The vulnerability is due to a lack of boundary condition checks on URL values. 


Vendor Status:
==============
The vendor has been informed, and they are fixing this bug.


Proof of concept Exploit:
=========================
[script]window.open(http://AAA.. [Ax517])[/script]


Discovered by/Credit:
=====================
Bahaa Naamneh
b_naamneh@hotmail.com
www.bsecurity.tk


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux