Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
Publish Date : 2004-12-23 Last Update Date : 2021-07-23
Title |
Definition Id |
Class |
Family |
Windows (ME, NT, 2K, XP), IE v6,SP1 CSS Heap Memory Corruption Vulnerability |
oval:org.mitre.oval:def:6579 |
|
windows |
Windows (ME, NT, 2K), IE v5.5,SP2 CSS Heap Memory Corruption Vulnerability |
oval:org.mitre.oval:def:5592 |
|
windows |
Windows 2000, IE v5.01 CSS Heap Memory Corruption Vulnerability |
oval:org.mitre.oval:def:2906 |
|
windows |
Windows Server 2003, IE v6,SP1 CSS Heap Memory Corruption Vulnerability |
oval:org.mitre.oval:def:3372 |
|
windows |
Windows XP, IE v6.0 CSS Heap Memory Corruption Vulnerability |
oval:org.mitre.oval:def:4169 |
|
windows |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.