MS.IE.WebDav.Pathname.Parsing.Memory.Corruption

description-logoDescription

This indicates an attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer.
The vulnerability is caused by an error that occurs when the vulnerable software handles a WebDav pathname that is too long. It allows a remote attacker to execute arbitrary code via sending a crafted web page.

affected-products-logoAffected Products

Internet Explorer 7 for Windows XP Service Pack 2 and Windows XP Service Pack 3
Internet Explorer 7 for Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
Internet Explorer 7 for Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
Internet Explorer 7 for Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
Internet Explorer 7 for Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Internet Explorer 7 in Windows Vista and Internet Explorer 7 in Windows Vista Service Pack 1
Internet Explorer 7 in Windows Vista x64 Edition and Internet Explorer 7 in Windows Vista x64 Edition Service Pack 1
Internet Explorer 7 in Windows Server 2008 for 32-bit Systems
Internet Explorer 7 in Windows Server 2008 for x64-based Systems
Internet Explorer 7 in Windows Server 2008 for Itanium-based Systems

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's web site for the suggested workaround:
http://www.microsoft.com/technet/security/Bulletin/ms08-073.mspx

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)