First published: Tue Jan 09 2007(Updated: )
Integer overflow in the Vector Markup Language (VML) implementation (vgx.dll) in Microsoft Internet Explorer 5.01, 6, and 7 on Windows 2000 SP4, XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted web page that contains unspecified integer properties that cause insufficient memory allocation and trigger a buffer overflow, aka the "VML Buffer Overrun Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Internet Explorer | =5.01-sp4 | |
microsoft ie | =6.0-sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Internet Explorer | =7.0 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0024 has a critical severity rating due to the potential for remote code execution.
To address CVE-2007-0024, it is recommended to apply the security updates provided by Microsoft for the affected versions of Internet Explorer.
CVE-2007-0024 affects Microsoft Internet Explorer versions 5.01, 6, and 7 running on Windows 2000 SP4, XP SP2, and Windows Server 2003 SP1.
Yes, CVE-2007-0024 can allow remote attackers to execute arbitrary code, potentially leading to full control over the affected system.
CVE-2007-0024 is associated with attacks that involve crafted web pages designed to exploit the integer overflow vulnerability.