A Couple points I'd like to make here... 1). 90 days is plenty of time to fix a vulnerability, and in this case the author is merely stating the details of which will be revealed after 90 days. I doubt this will lead to any mass exploitation as I imagine you will need to go to a "specially crafted" website to exploit this DoS condition anyway. "... should the device browser access a WML page with malformed content..." Seems pretty harmless, annoying, but harmless. You go to an "evil" page and your mobile browser crashes and you need to hard reboot, yeah not a lot of reason to mass exploit this imho. 2). I'm pretty sure it's pwned, or owned, but not p0wned. http://www.urbandictionary.com/define.php?term=pwned 3). Thanks for the info on that DST patch issue, good to know. Eric McCarty -----Original Message----- From: Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP] [mailto:sbradcpa@xxxxxxxxxxx] Sent: Friday, February 09, 2007 10:09 AM To: clappymonkey@xxxxxxxxx Cc: bugtraq@xxxxxxxxxxxxxxxxx Subject: Re: Denial Of Service in Internet Explorer for MS Windows Mobile 5.0 With all due respect..... the "90 days fix it or else" on a mobile platform is being optimistic don't you think when I'm still struggling getting a cab file update on all of my mobile phones for the time change issue. Quite frankly a denial of service on IE on a phone will get me yelled at ...it won't get me p0wned. I'm going to already be yelled at when their calendars are all screwed up so quite frankly on the threat of being yelled at scale .... right now Daylight Savings issues has a higher priority. http://support.microsoft.com/kb/932046 For those not aware, in a few weeks the USA time zones spring forward earlier than they have been. Mobile phones need a DST patch along with just about everything else.... clappymonkey@xxxxxxxxx wrote: > Denial Of Service in Internet Explorer for MS Windows Mobile 5.0 > ----------------------------------------------------------------- > > Date of Release: 09/02/2007 > > Description: A vulnerability exists in Internet Explorer for Microsoft Windows Mobile 5.0 (for smart phone and pocket PC) that impacts upon the availability and security of devices operating on this platform. It is possible for an attacker to create an overflow state within Internet Explorer, resulting in the termination of the normal functionality of IE and a Denial of Service, should the device browser access a WML page with malformed content. Users of affected devices must perform a hard battery reset in order to resume Internet Explorer and normal device operations. > > Patch / Fix: No patch is available at this time > > Advisory History: This issue was first reported to Microsoft on 31/01/07. > > Full technical details of this vulnerability will be withheld for the next ninety days, or until such time as a patch / fix is forthcoming (whichever event happens first). > > Credit: Michael Kemp (www.clappymonkey.com) > > -- Letting your vendors set your risk analysis these days? http://www.threatcode.com If you are a SBSer and you don't subscribe to the SBS Blog... man ... I will hunt you down... http://blogs.technet.com/sbs