IE "object" Tag Memory Corruption Vulnerability
Description:
Michal Zalewski has discovered a vulnerability in Internet Explorer, which potentially can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an error in the processing of certain sequences of nested "object" HTML tags. This can be exploited to corrupt memory by tricking a user into visiting a malicious web site.
Successful exploitation may allow execution of arbitrary code, but has not been proven.
NOTE: During analysis, Secunia discovered a variant of this vulnerability and confirmed code execution on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2. Other versions may also be affected. Details about this variant will not be publicly disclosed at present, but have been sent to Microsoft, who are currently working on a patch.
Solution:
Do not visit untrusted web sites.
Critical Level:
Highly criticalSource:
Secunia - Internet Explorer "object" Tag Memory Corruption Vulnerabilityteltarif.ch:
Secunia bewertet die Schwachstelle als "sehr kritisch"
News by Luca Rocchi and Marc Büchel - German Translation by Paul Görnhardt - Italian Translation by Francesco Daghini