First published: Tue Sep 14 2004(Updated: )
Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya IP600 Media Servers | ||
Microsoft Internet Explorer | =6.0-sp1 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp3 | |
Internet Explorer | =5.0.1-sp4 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =6.0 | |
Avaya DEFINITY ONE Media Server | ||
Avaya S3400 | ||
Avaya S8100 | ||
Avaya Modular Messaging Message Storage Server | =1.1 | |
Avaya Modular Messaging Message Storage Server | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0842 is classified as a high severity vulnerability due to its potential to cause application crashes and denial of service.
To fix CVE-2004-0842, users should upgrade their Internet Explorer to the latest version available and apply any relevant security updates.
CVE-2004-0842 affects Internet Explorer 5.0.1 and 6.0 SP1 as well as several Avaya products, including IP600 Media Servers.
CVE-2004-0842 exploits a vulnerability in how Internet Explorer processes certain malformed CSS elements, triggering memory corruption.
Using an affected version of Internet Explorer poses significant risk, and it is highly recommended to update or switch to a more secure browser.