Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.0.1 | 5.0.1.x |
microsoft / internet_explorer | 5.0.1-sp1 | 5.0.1-sp1.x |
microsoft / internet_explorer | 5.0.1-sp2 | 5.0.1-sp2.x |
microsoft / internet_explorer | 5.0.1-sp3 | 5.0.1-sp3.x |
microsoft / internet_explorer | 5.0.1-sp4 | 5.0.1-sp4.x |
microsoft / internet_explorer | 5.5 | 5.5.x |
microsoft / internet_explorer | 5.5-sp1 | 5.5-sp1.x |
microsoft / internet_explorer | 5.5-sp2 | 5.5-sp2.x |
microsoft / internet_explorer | 6.0 | 6.0.x |
microsoft / ie | 6.0-sp1 | 6.0-sp1.x |
avaya / definity_one_media_server | - | - |
avaya / s8100 | - | - |
avaya / ip600_media_servers | - | - |
avaya / modular_messaging_message_storage_server | 1.1 | 1.1.x |
avaya / modular_messaging_message_storage_server | 2.0 | 2.0.x |
avaya / s3400 | - | - |