Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

MS Internet Explorer 'Style' Object Remote Code Execution Vulnerability

Information

Severity

Severity

Critical

Family

Family

Windows : Microsoft Bulletins

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

4 years ago

Summary

This host is missing a critical security update according to Microsoft Bulletin MS09-072.

Insight

Insight

Multiple flaws are due to: - The 'tdc.ocx' ActiveX control being built with vulnerable Active Template Library (ATL) headers, which could allow the instantiation of arbitrary objects that can bypass certain security related policies. - Memory corruption error occurs when the browser attempts to access an object that has not been initialized or has been deleted, which could be exploited to execute arbitrary code via a specially crafted web page. - Memory corruption occurs when processing 'CSS' objects. - Race condition occurs while repetitively clicking between two elements at a fast rate, which could be exploited to execute arbitrary code via a specially crafted web page. - A dangling pointer during deallocation of a circular dereference for a CAttrArray object, which could be exploited to execute arbitrary code via a specially crafted web page.

Affected Software

Affected Software

Microsoft Internet Explorer version 5.x/6.x/7.x/8.x

Solution

Solution

The vendor has released updates. Please see the references for more information.

Common Vulnerabilities and Exposures (CVE)