Microsoft Internet Explorer fails to properly handle chained Cascading Style Sheets (CSS). This can allow a remote attacker to execute arbitrary code on a vulnerable system.
CSS is a mechanism for adding style to web documents. Microsoft Internet Explorer contains a vulnerability in the handling of chained CSS. An attacker can exploit this vulnerability by creating a specially crafted HTML document that causes memory corruption when it is viewed with Internet Explorer.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebOC control) to crash.
Apply an update
This vulnerability is addressed in Microsoft Security Bulletin MS06-042.
Disable Active Scripting
This vulnerability was reported by Microsoft, who in turn credit Sam Thomas.
This document was written by Will Dormann.
|Date First Published:||2006-08-08|
|Date Last Updated:||2006-08-16 21:11 UTC|