The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS03-040: Cumulative Patch for Internet Explorer (828750)
Time: 00:07 EST/05:07 GMT | News Source: ActiveWin.com | Posted By: Robert Stein

A vulnerability that occurs because Internet Explorer does not properly determine an object type returned from a Web server in a popup window. It could be possible for an attacker who exploited this vulnerability to run arbitrary code on a user's system. If a user visited an attacker's Web site, it could be possible for the attacker to exploit this vulnerability without any other user action. An attacker could also craft an HTML–based e-mail that would attempt to exploit this vulnerability.

A vulnerability that occurs because Internet Explorer does not properly determine an object type returned from a Web server during XML data binding. It could be possible for an attacker who exploited this vulnerability to run arbitrary code on a user's system. If a user visited an attacker's Web site, it could be possible for the attacker to exploit this vulnerability without any other user action. An attacker could also craft an HTML–based e-mail that would attempt to exploit this vulnerability.

In addition, a change has been made to the method by which Internet Explorer handles Dynamic HTML (DHTML) Behaviors in the Internet Explorer Restricted Zone. It could be possible for an attacker exploiting a separate vulnerability (such as one of the two vulnerabilities discussed above) to cause Internet Explorer to run script code in the security context of the Internet Zone. In addition, an attacker could use Windows Media Player’s (WMP) ability to open URLs to construct an attack. An attacker could also craft an HTML-based e-mail that could attempt to exploit this behavior. To exploit these flaws, the attacker would have to create a specially formed HTML–based e-mail and send it to the user. Alternatively an attacker would have to host a malicious Web site that contained a Web page designed to exploit these vulnerabilities.

Write Comment
Return to News

  Displaying 601 through 604 of 604
Prev | First
  The time now is 12:30:04 PM ET.
Any comment problems? E-mail us
#601 By 4240821 (82.115.4.230) at 8/11/2025 12:26:18 AM
https://www.xfree.com/wedmaloggai155
https://www.xfree.com/inpelroloo509
https://www.xfree.com/cornsohubuk723
https://www.xfree.com/diccompprewon712
https://www.xfree.com/laswallseti834
https://www.xfree.com/liojeancuybreak583
https://www.xfree.com/vefarnvecgie424
https://www.xfree.com/digtidopi342
https://www.xfree.com/altalongspar112
https://www.xfree.com/flordoogetas794

#602 By 4240821 (82.115.4.230) at 8/11/2025 5:51:45 PM
https://www.xfree.com/sihoudepi473
https://www.xfree.com/tasilosons228
https://www.xfree.com/nesprindipudd132
https://www.xfree.com/diolelacan706
https://www.xfree.com/consletnida125
https://www.xfree.com/diagasubge294
https://www.xfree.com/corcuitire168
https://www.xfree.com/newlicarfarm348
https://www.xfree.com/centthajudip882
https://www.xfree.com/liavidanoc259

#603 By 4240821 (82.115.4.230) at 8/12/2025 9:48:34 AM
https://www.xfree.com/jimnisedo751
https://www.xfree.com/grisunmetne750
https://www.xfree.com/nitergmostdi279
https://www.xfree.com/coabrynapteam26
https://www.xfree.com/menslifcandmi427
https://www.xfree.com/granenkonwhoe63
https://www.xfree.com/caigichadi754
https://www.xfree.com/goldmandripul947
https://www.xfree.com/popaticde539
https://www.xfree.com/noutledabo123

#604 By 4240821 (82.115.4.230) at 8/12/2025 10:55:34 PM
https://www.xfree.com/ticpersmilil742
https://www.xfree.com/tubamaso408
https://www.xfree.com/vefarnvecgie424
https://www.xfree.com/gachogato202
https://www.xfree.com/lacdemartho374
https://www.xfree.com/britniberli683
https://www.xfree.com/covitifmu271
https://www.xfree.com/hamsrelispay360
https://www.xfree.com/suttbestmunsren796
https://www.xfree.com/elfascyla185

Write Comment
Return to News
  Displaying 601 through 604 of 604
Prev | First
  The time now is 12:30:04 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *