Race condition in Microsoft Internet Explorer allows user-assisted attackers to overwrite arbitrary files and possibly execute code by tricking a user into performing a drag-and-drop action from certain objects, such as file objects within a folder view, then predicting the drag action, and re-focusing to a malicious window.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/424863/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/0553 | vdb entry vendor advisory |
http://secunia.com/advisories/18787 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/424940/100/0/threaded | mailing list |
http://www.securiteam.com/windowsntfocus/5MP0B0UHPA.html | vendor advisory |
http://www.securityfocus.com/bid/16352 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24648 | vdb entry |
http://securitytracker.com/id?1015049 | vdb entry |
http://www.osvdb.org/2707 | vdb entry |
http://blogs.technet.com/msrc/archive/2006/02/13/419439.aspx |