Page Transition Memory Corruption Vulnerability
Publish Date: 15 février 2011
Gravité: : Critique
Identifiant(s) CVE: : CVE-2009-0551
Date du conseil: 15 février 2011
Description
Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 does not properly handle transition errors in a request for one HTTP document followed by a request for a second HTTP document, which allows remote attackers to execute arbitrary code via vectors involving (1) multiple crafted pages on a web site or (2) a web page with crafted inline content such as banner advertisements, aka "Page Transition Memory Corruption Vulnerability."
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1003430
Trend Micro Deep Security DPI Rule Name: 1003430 - Page Transition Memory Corruption Vulnerability
Affected software and version:
- microsoft internet_explorer 6
- microsoft internet_explorer 7