Microsoft Internet Explorer Vector Markup Language VGX.DLL Remote Buffer Overflow Vulnerability

To exploit this issue, an attacker must entice an unsuspecting user to view a malicious HTML document.

A VML document containing the following construct pointing to a malicious compressed image file will trigger this issue:

<v:rect>
<v:imagedata src="http://www.example.com/compressed.emz">
</v:rect>

Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.


 

Privacy Statement
Copyright 2010, SecurityFocus