Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking an object or pressing keys that are actually applied to a "Yes" approval for executing the control.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/1559 | vdb entry vendor advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0759.html | mailing list |
http://www.securityfocus.com/bid/17713 | vdb entry exploit |
http://securitytracker.com/id?1015720 | vdb entry |
http://www.osvdb.org/22351 | vdb entry |
http://student.missouristate.edu/m/matthew007/advisories.asp?adv=2006-02 | vendor advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045589.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26111 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0019.html | mailing list |
http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ | |
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html | mailing list |