First published: Tue Sep 14 2004(Updated: )
Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Definity One Media Server | ||
Microsoft Ie | =6.0-sp1 | |
Avaya S8100 | ||
Avaya Ip600 Media Servers | ||
Avaya S3400 | ||
Microsoft Internet Explorer | =5.5-sp2 | |
Microsoft Internet Explorer | =5.0.1 | |
Microsoft Internet Explorer | =5.0.1-sp2 | |
Microsoft Internet Explorer | =5.0.1-sp3 | |
Microsoft Internet Explorer | =5.0.1-sp4 | |
Microsoft Internet Explorer | =5.0.1-sp1 | |
Microsoft Internet Explorer | =5.5 | |
Microsoft Internet Explorer | =5.5-sp1 | |
Microsoft Internet Explorer | =6.0 | |
Avaya Modular Messaging Message Storage Server | =2.0 | |
Avaya Modular Messaging Message Storage Server | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.