Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from memory corruption) via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the @;/* string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the CSS Heap Memory Corruption Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Definity_one_media_server | Avaya | * | * |
Ie | Microsoft | 6.0 | 6.0 |
S8100 | Avaya | * | * |
Ip600_media_servers | Avaya | * | * |
S3400 | Avaya | * | * |
Internet_explorer | Microsoft | 5.5 | 5.5 |
Internet_explorer | Microsoft | 5.0.1 | 5.0.1 |
Internet_explorer | Microsoft | 5.0.1 | 5.0.1 |
Internet_explorer | Microsoft | 5.0.1 | 5.0.1 |
Internet_explorer | Microsoft | 5.0.1 | 5.0.1 |
Internet_explorer | Microsoft | 5.0.1 | 5.0.1 |
Internet_explorer | Microsoft | 5.5 | 5.5 |
Internet_explorer | Microsoft | 5.5 | 5.5 |
Internet_explorer | Microsoft | 6.0 | 6.0 |