|
|
|
|
| |
Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=761
|
| |
Vulnerable Systems:
* Windows 2000 SP4 running Internet Explorer version 5.01
On Internet Explorer 5.01 a function return address can be overwritten with attacker controlled data which results in an exploitable condition. However on Internet Explorer 6 the vulnerability will only overflow one byte. For Internet Explorer 6 on Windows 2000 platform, the overflowed byte is in a local variable, and overwriting it doesn't affect program execution at all. For Internet Explorer 6 on Windows XP SP2, the overflowed byte is in the stack cookie, which causes Internet Explorer to terminate and only results in a denial of service.
Vendor response:
Microsoft has released a patch which addresses this issue. For more information, consult their advisory at the following URL.
http://www.microsoft.com/technet/security/bulletin/ms08-073.mspx
Microsoft recommends that customers apply the update immediately.
CVE Information:
CVE-2008-4261
Disclosure Timeline:
08/26/2008 - Initial Vendor Notification
08/26/2008 - Initial Vendor Reply
09/24/2008 - Additional Vendor Feedback
12/02/2008 - Additional Vendor Feedback
12/09/2008 - Coordinated Public Disclosure
|
|
|
|
|