Microsoft Internet Explorer Two Code Execution Vulnerabilities


Recommended Posts

Microsoft Internet Explorer Two Code Execution Vulnerabilities

Secunia Advisory: SA33845

Release Date: 2009-02-10

Last Update: 2009-02-11

Critical: crit_4.gif

Highly critical

Impact: System access

Where: From remote

Solution Status: Vendor Patch

Software:Microsoft Internet Explorer 7.x

Description:

Two vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

1) An error when handling document objects can be exploited to corrupt memory via a specially crafted web page where an object is appended and deleted in a specific order.

2) An error exists during parsing of CSS (Cascading Style Sheets) in XHTML strict mode when a style sheet contains a specific combination of style directives (one of them being a "zoom"). This can be exploited to corrupt memory via a specially crafted web page.

Successful exploitation of the vulnerabilities allows execution of arbitrary code.

Secunia advisories for full details: http://secunia.com/advisories/33845/

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...