Microsoft Internet Explorer Multiple Vulnerabilities( 13 February 2008 )
RISK: Medium Risk
1. HTML Rendering Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way Internet Explorer interprets HTML with certain layout combinations. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.
2. Property Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way Internet Explorer handles a property method. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.
3. Argument Handling Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way Internet Explorer handles argument validation in image processing. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.
4. ActiveX Object Memory Corruption Vulnerability
A remote code execution vulnerability exists in a component of Microsoft Fox Pro. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user
Impact
- Remote Code Execution
System / Technologies affected
- Microsoft Internet Explorer 5.01
- Microsoft Internet Explorer 6
- Windows Internet Explorer 7
- Windows 2000
- Windows XP
- Windows Server 2003
- Windows Vista
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Download locations for this patch
- Microsoft Internet Explorer 5.01 Service Pack 4
- Microsoft Windows 2000 Service Pack 4 - Microsoft Internet Explorer 6 Service Pack 1
- Microsoft Windows 2000 Service Pack 4 - Microsoft Internet Explorer 6
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems - Windows Internet Explorer 7
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista
- Windows Vista x64 Edition
Vulnerability Identifier
Source
Related Link
Share with