XEROF

 

IE7 RSS vulnerability : altering the RSS store by hand


I thought that, now that IE7 has shipped, I would give it a run and see whether this evil thing passes a basic smell test.

Case in point, after checking out that the RSS store is still unencrypted, I went on to try whether the feed items would at least enforce a CRC checksum mechanism to prevent silent third-party alteration.

Sure enough, wrong again. I took a simple hex editor and changed a letter in one of the feed items. In Robert Scoble's blog, I changed the Oh for a Ah right after the "Second in a series" words. As seen in the screen captures below, before and after the change.


The original RSS feed item


The feed item in IE7 after the manual change

I then went on to make more radical changes. It all gets through without a warning or error or anything. What IE7 does is filter out a feed item if it sees blatant scripting instructions in it. That's good...when you don't know that most real scripting hacks are not blatant...

I can't even start to imagine the number of nefarious purposes that the lack of CRC checksum lets in. In any case, I think the entire security team over at Microsoft IE team must be fired right away.

Posted on 24-October-2006 07:51 | Category: News | comment[0] | trackbacks[15]

 

 

<-- previous page

< August >
0102030405
0607080910
1112131415
1617181920
2122232425
2627282930
31



 

 

This site
Home
Articles

DevTools
CPU-Z
EditPlus
ExplorerXP
Kill.exe
OllyDbg
DependencyWalker
Process Explorer
autoruns.exe
Araxis
COM Trace injection
CodeStats
NetBrute
FileMon/Regmon
BoundsChecker
AQTime profiler
Source monitor
GDI leaks tracking
Rootkit revealer
Rootkit removal
RunAsLimitedUser(1)
RunAsLimitedUser(2)

 

 

Liens
Le Plan B
Un jour à Paris
Meneame
Rezo.net (aggr)
Reseau voltaire
Cuba solidarity project
Le grand soir
L'autre journal
Le courrier suisse
L'Orient, le jour
Agoravox (aggr)