Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Layout Memory Corruption Vulnerability."
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA10-222A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11832 | vdb entry third party advisory signature |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 | patch vendor advisory |