Race condition in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Race Condition Memory Corruption Vulnerability."
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7774 | vdb entry signature |
http://www.us-cert.gov/cas/techalerts/TA10-089A.html | third party advisory us government resource |
http://www.securityfocus.com/bid/39026 | vdb entry patch |
http://www.us-cert.gov/cas/techalerts/TA10-068A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 | vendor advisory |
http://www.vupen.com/english/advisories/2010/0744 | vdb entry patch vendor advisory |
http://securitytracker.com/id?1023773 | vdb entry |