Microsoft Internet Explorer cloneNode Use-After-Free Remote Code Execution Vulnerability

Microsoft Internet Explorer is prone to a remote code-execution vulnerability.

Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.

Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.

Microsoft Internet Explorer versions 7 and 8 are affected.


 

Privacy Statement
Copyright 2010, SecurityFocus