Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from memory corruption) via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the @;/* string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the CSS Heap Memory Corruption Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ip600_media_servers | Avaya | * | * |
Ie | Microsoft | 6.0-sp1 (including) | 6.0-sp1 (including) |
Internet_explorer | Microsoft | 5.0.1 (including) | 5.0.1 (including) |
Internet_explorer | Microsoft | 5.0.1-sp1 (including) | 5.0.1-sp1 (including) |
Internet_explorer | Microsoft | 5.0.1-sp2 (including) | 5.0.1-sp2 (including) |
Internet_explorer | Microsoft | 5.0.1-sp3 (including) | 5.0.1-sp3 (including) |
Internet_explorer | Microsoft | 5.0.1-sp4 (including) | 5.0.1-sp4 (including) |
Internet_explorer | Microsoft | 5.5 (including) | 5.5 (including) |
Internet_explorer | Microsoft | 5.5-sp1 (including) | 5.5-sp1 (including) |
Internet_explorer | Microsoft | 5.5-sp2 (including) | 5.5-sp2 (including) |
Internet_explorer | Microsoft | 6.0 (including) | 6.0 (including) |
Definity_one_media_server | Avaya | * | * |
S3400 | Avaya | * | * |
S8100 | Avaya | * | * |