Microsoft Internet Explorer 6 and 7 does not perform proper "argument validation" during print preview, which allows remote attackers to execute arbitrary code via unknown vectors, aka "HTML Component Handling Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/2349 | vdb entry |
http://www.securityfocus.com/bid/30612 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5913 | vdb entry signature |
http://www.securitytracker.com/id?1020674 | vdb entry |
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 | vendor advisory |
http://secunia.com/advisories/31375 | third party advisory vendor advisory |