First published: Tue Apr 08 2008(Updated: )
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =7-windows_xp_sp2 | |
Internet Explorer | =7 | |
Internet Explorer | =6 | |
Internet Explorer | =6 | |
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Microsoft Internet Explorer | =7 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1_itanium | |
Internet Explorer | =6 | |
Microsoft Internet Explorer | =7-windows_server_2003_sp1 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Internet Explorer | =7 | |
Microsoft Internet Explorer | =5.01-windows_2000_sp4 | |
Internet Explorer | =6 | |
Microsoft Internet Explorer | =6-windows_xp_sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1085 has a high severity rating due to the potential for remote code execution.
To fix CVE-2008-1085, update Microsoft Internet Explorer to a version that addresses this vulnerability.
CVE-2008-1085 affects Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7.
CVE-2008-1085 allows remote attackers to execute arbitrary code via crafted data streams.
While there is no specific workaround for CVE-2008-1085, users are advised to avoid untrusted content and consider transitioning away from affected versions.