MS.IE.Element.Tags.Memory.Corruption

description-logoDescription

This indecates detection of an attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer.
The vulnerability results from an error in the handling of document objects that have been created, modified, deleted then accessed by JavaScript. As a result of storing references to document nodes and then removing them by a separate reference, the document model in memory becomes unstable. Accessing the tags property while the document is in this unstable condition results in heap corruption, allowing the execution of arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability, in that the victim must visit a malicious page.

affected-products-logoAffected Products

Microsoft Internet Explorer 6
Microsoft Internet Explorer 7

Impact logoImpact

System compromise, remote code execution.

recomended-action-logoRecommended Actions

Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/bulletin/ms07-069.mspx

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

References

zdi-07-075