Microsoft Internet Explorer VML Code Execution Vulnerability    

Secunia Advisory:       SA21989         
Release Date:   2006-09-19

Critical:       
Extremely critical
Impact:         System access
Where:  From remote
Solution Status:        Unpatched

Software:       Microsoft Internet Explorer 6.x

Description:
A vulnerability has been discovered in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in the processing of Vector Markup Language (VML) documents. This can be exploited by e.g. tricking a user into viewing a malicious VML document containing an overly long "fill" method inside a "rect" tag.

Successful exploitation allows execution of arbitrary code.

NOTE: Reportedly, this is currently being exploited in the wild.

The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2. Other versions may also be affected.

Solution:
Do not visit untrusted web sites.

Deactivating Active Scripting will prevent exploitation using the currently known exploit.

Provided and/or discovered by:
Sample exploit provided by Sunbelt Software.
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to