Vulnerabilities > CVE-2008-4261 - Resource Management Errors vulnerability in Microsoft Internet Explorer 5.01/6/7
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in Microsoft Internet Explorer 5.01 SP4, 6 SP1 on Windows 2000, and 6 on Windows XP and Server 2003 does not properly handle extraneous data associated with an object embedded in a web page, which allows remote attackers to execute arbitrary code via crafted HTML tags that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
OS | 15 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS08-073 |
bulletin_url | |
date | 2008-12-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 958215 |
knowledgebase_url | |
severity | Critical |
title | Cumulative Security Update for Internet Explorer |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-073.NASL |
description | The remote host is missing the IE cumulative security update 958215. The remote version of IE is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 35072 |
published | 2008-12-10 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/35072 |
title | MS08-073: Microsoft Internet Explorer Multiple Vulnerabilities (958215) |
code |
|
Oval
accepted | 2011-12-05T04:00:32.324-05:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Stack-based buffer overflow in Microsoft Internet Explorer 5.01 SP4, 6 SP1 on Windows 2000, and 6 on Windows XP and Server 2003 does not properly handle extraneous data associated with an object embedded in a web page, which allows remote attackers to execute arbitrary code via crafted HTML tags that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:5829 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2008-12-09T13:31:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | HTML Rendering Memory Corruption Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 71 |
Saint
bid | 32595 |
description | Internet Explorer embed tag src extension buffer overflow |
id | win_patch_ie_v5,win_patch_ie_v6 |
osvdb | 50610 |
title | ie_embed_src_ext |
type | client |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=761
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=761
- http://www.securitytracker.com/id?1021371
- http://www.securitytracker.com/id?1021371
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.vupen.com/english/advisories/2008/3385
- http://www.vupen.com/english/advisories/2008/3385
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5829
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5829