Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from memory corruption) via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the @;/* string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the CSS Heap Memory Corruption Vulnerability.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Ip600_media_servers | Avaya | * | * | 
| Ie | Microsoft | 6.0-sp1 (including) | 6.0-sp1 (including) | 
| Internet_explorer | Microsoft | 5.0.1 (including) | 5.0.1 (including) | 
| Internet_explorer | Microsoft | 5.0.1-sp1 (including) | 5.0.1-sp1 (including) | 
| Internet_explorer | Microsoft | 5.0.1-sp2 (including) | 5.0.1-sp2 (including) | 
| Internet_explorer | Microsoft | 5.0.1-sp3 (including) | 5.0.1-sp3 (including) | 
| Internet_explorer | Microsoft | 5.0.1-sp4 (including) | 5.0.1-sp4 (including) | 
| Internet_explorer | Microsoft | 5.5 (including) | 5.5 (including) | 
| Internet_explorer | Microsoft | 5.5-sp1 (including) | 5.5-sp1 (including) | 
| Internet_explorer | Microsoft | 5.5-sp2 (including) | 5.5-sp2 (including) | 
| Internet_explorer | Microsoft | 6.0 (including) | 6.0 (including) | 
| Definity_one_media_server | Avaya | * | * | 
| S3400 | Avaya | * | * | 
| S8100 | Avaya | * | * |