Short Name |
SMTP:OUTLOOK:HTML-NAME-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
Internet Explorer Malformed Name Buffer Overflow |
Release Date |
2004/11/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects a HTML e-mail message containing a maliciously crafted tag with an overly long "name" parameters. Attackers can send an e-mail with these malicious tags in order to exploit a vulnerability in the HTML rendering code of the mail reader, leading to remote code execution.
Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself due to insufficient boundary checks performed by the application and results in arbitrary code execution or a denial of service. This issue does not affect the following Internet Explorer 6 versions: - Internet Explorer 6 for Windows Server 2003 - Internet Explorer 6 for Windows Server 2003 64-Bit Edition and Windows XP 64-Bit Edition Version 2003 - Internet Explorer 6 for Windows XP Service Pack 2