Short Name |
HTTP:STC:IE:XML-MIME-CORRUPT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft XML Core Services MIME Viewer Memory Corruption |
Release Date |
2010/09/28 |
Update Number |
1780 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. All versions of Microsoft Windows using Microsoft XML Core Services 3.0 are vulnerable. Attackers can leverage this vulnerability to execute arbitrary code on the victim.
Microsoft XML Core Services (MSXML) is prone to a remote memory-corruption vulnerability because of a race condition that may cause a NULL-pointer dereference, read or write operations to invalid addresses, or other memory-corruption issues. Attackers may exploit this issue to execute arbitrary machine code in the context of the vulnerable application. Failed exploit attempts will likely crash the application. NOTE: SANS has provided new information that lowers the impact of this vulnerability. Please see the reference section for details.