Microsoft Internet Explorer is vulnerable to a buffer overflow when processing a long URL on a web site that uses HTTP 1.1 compression. This could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Internet Explorer 6 Service Pack 1 on Windows 2000 and Windows XP SP1 contains a vulnerability when viewing a web site using the HTTP 1.1 protocol. If the web site uses HTTP 1.1 compression and contains an overly long URL, a buffer overflow can occur.
Note that this vulnerability was introduced with the first release of the MS06-042 updates on August 8, 2006.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser ActiveX control) to crash.
Apply an update
Disable Active Scripting
Thanks to Dejan Kovacevic of Bold Internet Solutions for reporting this vulnerability.
This document was written by Will Dormann.
|Date First Published:||2006-08-22|
|Date Last Updated:||2006-08-24 18:12 UTC|