Schweregrad: : Crítico
  Identificador(es) CVE: : CVE-2006-4868,MS06-055
  Data do informe: 21 julho 2015

  Descrição

Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.

  Exposição das informações

Apply associated Trend Micro DPI Rules.

  Solução

  Trend Micro Deep Security DPI Rule Number: 1002061
  Trend Micro Deep Security DPI Rule Name: 1000776 - Microsoft Internet Explorer VML Rect Fill Method Buffer Overflow

  Software infectado e versão:

  • Microsoft Internet Explorer 5.0.1 SP4
  • Microsoft Internet Explorer 6.0
  • Microsoft Outlook 2003