HTTP: Internet Explorer HR Tag Align Parameter Buffer Overflow
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer 6.0 SP1 and earlier. Attackers can embed a script in malicious HTML to dynamically set the "align" parameter to the "HR" tag, which can allow malicious code to execute in the context of the logged in user.
Extended Description
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag.
Affected Products
Microsoft windows_98
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
7.5