HTTP: Internet Explorer OBJECT Tag Buffer Overflow (1)
This signature detects attempts to exploit a vulnerability in Microsoft Internet Explorer 6.0 SP1 and earlier. Attackers can send malicious HTTP data to a target; when the target downloads the malicious Web page or connects to the malicious Web server, the attacker can execute arbitrary commands on the target host.
Extended Description
Microsoft Internet Explorer is prone to a boundary condition error when handling OBJECT tags in web pages. When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. This could cause Internet Explorer to fail or potentially result in the execution arbitrary code in the security context of the current user.
Affected Products
Microsoft internet_explorer
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
7.5