Vulnerability Note VU#197852

Microsoft Internet Explorer fails to properly interpret HTML with certain layout combinations

Original Release date: 15 Nov 2006 | Last revised: 17 Nov 2006

Overview

A vulnerability in the way Microsoft Internet Explorer interprets malformed Web pages may lead to execution of arbitrary code.

Description

Microsoft Internet Explorer contatins a vulnerabilty that could be exploited when Internet Explorer attempts to interpret specially crafted Web pages. According to Microsoft Security Bulletin MS06-067:

    When Internet Explorer handles specially crafted HTML with certain HTML layout combinations it may corrupt system memory in such a way that an attacker could execute arbitrary code.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the affected user or cause a denial-of-service condition.

Solution

Update
Microsoft has released an update to address this issue. See Microsoft Security Bulletin MS06-067 for more details.

Workarounds


Microsoft recommends the following workarounds to mitigate this vulnerability:

  • Read and send email in plain text format
  • Disable active scripting

Please see Microsoft Security Bulletin MS06-067 for details on these workarounds.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-14 Nov 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported in Microsoft Security Bulletin MS06-067. Microsoft credits Sam Thomas, working with TippingPoint and the Zero Day Initiative for reporting this issue.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2006-4687
  • Date Public: 14 Nov 2006
  • Date First Published: 15 Nov 2006
  • Date Last Updated: 17 Nov 2006
  • Severity Metric: 27.00
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.