J-Security Center

Title: Microsoft Internet Explorer 'ieframe.dll' Script Injection Vulnerability

Severity: MODERATE


Microsoft Internet Explorer is a browser application for the Windows operating system.

The application is prone to a script-injection vulnerability when handling specially crafted requests to 'acr_error.htm' via the 'res://' protocol.

User-supplied HTML code supplied to 'acr_error.htm' is processed by 'acr.js', which fails to adequately sanitize the code before executing and rendering it in the browser window. Both 'acr_error.htm' and 'acr.js' are part of the 'ieframe.dll' dynamic-link library.

An attacker may leverage this issue to execute arbitrary code in the context of a user's browser. Successful exploits can allow the attacker to steal cookie-based authentication credentials, obtain potentially sensitive information stored on the victim's computer, and launch other attacks.

Internet Explorer 8 is vulnerable. Internet Explorer 7 is likely vulnerable as well, but this has not been confirmed.

Affected Products:

  • Microsoft Internet Explorer 8 Beta 1


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.