First published: Mon Jan 08 2007(Updated: )
Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft XML Core Services | =3.0 | |
Internet Explorer | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0099 has a CVSS severity rating of important due to its potential to allow remote code execution or a denial of service.
To fix CVE-2007-0099, users should apply the latest updates from Microsoft for Microsoft XML Core Services and Internet Explorer.
CVE-2007-0099 affects Microsoft XML Core Services 3.0 and Internet Explorer 6.
CVE-2007-0099 is associated with a race condition vulnerability that can be exploited through specially crafted XML documents.
Yes, CVE-2007-0099 could potentially lead to data loss if exploited, as it allows for arbitrary code execution.