Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A433 | vdb entry signature |
http://securitytracker.com/id?1016663 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 | vendor advisory |
http://www.osvdb.org/27855 | vdb entry |
http://www.kb.cert.org/vuls/id/119180 | us government resource third party advisory patch |
http://secunia.com/advisories/21396 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/3212 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/442579/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/19312 | vdb entry patch |
http://www.zerodayinitiative.com/advisories/ZDI-06-027.html | |
http://www.us-cert.gov/cas/techalerts/TA06-220A.html | us government resource third party advisory patch |