MicrosoftInternet Explorer CSS Handling Code Execution Vulnerability
RISK: Medium Risk
A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a dangling pointer in the Microsoft HTML Viewer (mshtml.dll) when retrieving certain CSS/STYLE objects via the "getElementsByTagName()" method, which could allow attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a malicious web page.
It has confirmed the vulnerability on fully patched Windows XP SP3 systems with Internet Explorer 7 and 6.
Impact
- Remote Code Execution
System / Technologies affected
- Microsoft Internet Explorer 7
- Microsoft Internet Explorer 6
Solutions
There is no patch available for this vulnerability currently.
Workaround :
- Disable Active Scripting in the Internet and Local intranet security zones.
- Enable Data Execution Protection (DEP) for Internet Explorer 6 Service Pack 2 or Internet Explorer 7
Vulnerability Identifier
Source
Related Link
Share with