[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-0099

Date: (C)2007-01-08   (M)2017-10-11
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability."

Reference:
SECTRACK-1021164
http://www.securityfocus.com/archive/1/archive/1/455965/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/455986/100/0/threaded
http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0113.html
http://www.securityfocus.com/archive/1/archive/1/456343/100/0/threaded
BID-21872
SECUNIA-23655
OSVDB-32627
ADV-2008-3111
HPSBST02386
IAVM:2008-A-0084
MS08-069
SSRT080164
TA08-316A
http://isc.sans.org/diary.php?storyid=2004

CPE    2
cpe:/a:microsoft:internet_explorer:6
cpe:/a:microsoft:xml_core_services:3.0
CWE    1
CWE-362
OVAL    2
oval:org.mitre.oval:def:5793
oval:org.secpod.oval:def:2670

© 2013 SecPod Technologies