A race condition in the way that Internet Explorer handles DHTML objects may allow a remote attacker to execute arbitrary code on a vulnerable system.
Dynamic HTML (DHTML) is built on an object model that extends the traditional static HTML document which enables Web authors to create more engaging and interactive Web pages.
By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system.
This vulnerability was publicly reported by Microsoft who credits Berend-Jan Wever working with iDEFENSE.
This document was written by Jeff Gennari and Will Dormann.
|Date First Published:||2005-04-12|
|Date Last Updated:||2005-08-18 15:44 UTC|