Skip to main content

Microsoft Internet Explorer Data Stream Handling Memory Corruption Vulnerability( 09 April 2008 )

Last Update Date: 28 Jan 2011 Release Date: 9 Apr 2008 5197 Views

RISK: Medium Risk

A remote code execution vulnerability exists in Internet Explorer because of the way that it processes data streams. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.


Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Internet Explorer 5.01 Service Pack 4
    - Microsoft Windows 2000 Service Pack 4
  • Microsoft Internet Explorer 6 Service Pack 1
    - Microsoft Windows 2000 Service Pack 4
  • Microsoft Internet Explorer 6
    -Windows XP Service Pack 2
    -Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
    -Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
    -Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
    -Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
  • Windows Internet Explorer 7
    -Windows XP Service Pack 2
    -Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
    -Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
    -Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
    -Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
    -Windows Vista and Windows Vista Service Pack 1
    -Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
    -Windows Server 2008 for 32-bit Systems
    -Windows Server 2008 for x64-based Systems
    -Windows Server 2008 for Itanium-based Systems

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Download locations for this patch


Vulnerability Identifier


Source


Related Link