Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8421 | vdb entry signature |
http://www.securityfocus.com/bid/39027 | vdb entry patch |
http://www.us-cert.gov/cas/techalerts/TA10-089A.html | third party advisory us government resource |
http://www.us-cert.gov/cas/techalerts/TA10-068A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 | vendor advisory |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=864 | third party advisory |
http://www.vupen.com/english/advisories/2010/0744 | vdb entry patch vendor advisory |
http://securitytracker.com/id?1023773 | vdb entry |