New Search

HTML Objects Memory Corruption Vulnerability

oval:org.mitre.oval:def:5720

Heap-based buffer overflow in the substringData method in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code related to an unspecified manipulation of a DOM object before a call to this method aka the "HTML Objects Memory Corruption Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Vista
  • Microsoft Windows XP
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2003
  • Microsoft Windows 2000
Class:
vulnerability
Reference(s):
  • CVE-2008-1442
Product(s):
  • Microsoft Internet Explorer 6
  • Microsoft Internet Explorer 7