HTTP: Internet Explorer createControlRange Invalid Object Type
This signature detects attempts to exploit a known DHTML input validation vulnerability in Microsoft Internet Explorer. Attackers can create a malicious Web page that, when viewed by a user, causes a heap overflow and executes arbitrary code on the target system.
Extended Description
Microsoft Internet Explorer is prone to a heap-based buffer-overflow vulnerability caused by a boundary condition error that is exposed when passing data to the 'createControlRange()' DHTML method. As a result, heap-based memory can be corrupted with attacker-supplied data. An attacker could exploit this issue to execute arbitrary code in the context of the currently logged-in user.
Affected Products
Nortel_networks symposium_web_client
References
BugTraq: 12475
CVE: CVE-2005-0055
URL: http://www.kb.cert.org/vuls/id/843771 http://www.microsoft.com/technet/security/bulletin/ms05-014.mspx
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
7.5