These vulnerabilities affect the following versions of Microsoft
Internet Explorer:
These vulnerabilities affect the following versions of the
Microsoft Windows operating system:
Please note that these vulnerabilities my affect any software that
uses the Microsoft Windows operating system to render HTML or
graphics.
Microsoft Internet Explorer contains three vulnerabilities that may
allow arbitrary code to be executed. The privileges gained by a remote
attacker depend on the software component being attacked. For example,
a user browsing to an unsafe web page using Internet Explorer could
have code executed with the same privilege as the user. These
vulnerabilities have been reported to be relatively straightforward to
exploit; even vigilant users visiting a malicious website, viewing a
malformed image, or reading an HTML-rendered email message may be
affected.
Microsoft Security Bulletin MS04-025
describes three vulnerabilities in Internet Explorer; more detailed
information is available in the individual vulnerability
notes. Note that in addition to Internet Explorer, any applications
that use the Internet Explorer HTML rendering engine to interpret HTML
documents may present additional attack vectors for these
vulnerabilities.
VU#266926 –
Microsoft Internet Explorer contains an integer overflow in the processing
of bitmap files
An integer overflow vulnerability has been discovered in the way that
Internet Explorer processes bitmap image files. This vulnerability could
allow a remote attacker to execute arbitrary code on a vulnerable system
by introducing a specially crafted bitmap file.
(Other resources: CAN-2004-0566)
VU#685364 –
Microsoft Internet Explorer contains a double-free vulnerability in the
processing of GIF files
A double-free vulnerability has been discovered in the way that
Internet Explorer processes GIF image files. When processing GIF image
files, the routine responsible for freeing memory may attempt to free the
same memory reference more than once. Deallocating the already freed
memory can lead to memory corruption, which could cause a
denial-of-service condition or potentially be leveraged by an attacker to
execute arbitrary code.
(Other resources: CAN-2003-1048)
VU#713878 –
Microsoft Internet Explorer does not properly validate source of
redirected frame Microsoft Internet Explorer does not properly display
URLs
As previously discussed in TA-163A,
Microsoft Internet Explorer does not adequately validate the security
context of a frame that has been redirected by a web server. An
attacker could exploit this vulnerability to evaluate script in
different security domains. By causing script to be evaluated in the
Local Machine Zone, the attacker could execute arbitrary code with the
privileges of the user running Internet Explorer. For a detailed
technical analysis of this vulnerability, please see VU#713878.
(Other resources: CAN-2004-0549)
Remote attackers exploiting the vulnerabilities described above may
execute arbitrary code with the privileges of the user running the
software components being attacked (e.g., Internet
Explorer). Attackers can exploit these vulnerabilities by convincing a
victim user to visit a malicious website, view a malformed image, or
read an HTML-rendered email message. No user intervention is required
beyond viewing an attacker-supplied HTML document or image. For
further details, please see the individual vulnerability
notes.
Apply the appropriate patch as specified by Microsoft Security
Bulletin MS04-025.
Please note that this bulletin provides a cumulative update that
replaces all previously released updates for Internet Explorer,
including those provided in MS04-004. However,
users who have applied hotfixes released after MS04-004
will need to install MS04-025. Please
see the FAQ section of Microsoft’s advisory for more details.
Microsoft provides several workarounds for each of these vulnerabilities.
Please consult the appropriate section(s) of Microsoft Security Bulletin
MS04-025.
This appendix contains information provided by vendors for this
advisory. As vendors report new information to US-CERT, we will update
this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments.
Please see Microsoft Security Bulletin MS04-025.
Feedback can be directed to the US-CERT
Technical Staff.
Jul 30, 2004: Initial release
Last updated
Systems Affected Applications and systems that use the libpng library. Overview Several vulnerabilities exist in…
Systems Affected Microsoft Windows XP Overview Microsoft Windows XP Service Pack 2 (SP2) significantly improves…
Systems Affected The following Oracle applications are affected: Oracle Database 10g Release 1, version 10.1.0.2…
Systems Affected MIT Kerberos 5 versions prior to krb5-1.3.5 Applications that use versions of MIT…
Systems Affected Applications that process JPEG images on Microsoft Windows, including but not limited to…
Systems Affected This vulnerability affects the following Microsoft Windows operating systems by default: Microsoft Windows…
This website uses cookies.