{"vuid":"VU#515749","idnumber":"515749","name":"Microsoft Internet Explorer CSS style element vulnerability","keywords":["Microsoft","Internet Explorer","IE","CSS","977981"],"overview":"Microsoft Internet Explorer (IE) does not safely reference CSS style elements. Using a specially crafted HTML page, an attacker can cause IE to crash and potentially execute arbitrary code.","clean_desc":"IE contains a vulnerability in the way it references CSS style elements. Processing a specially crafted HTML page could cause IE to access an invalid memory location and crash. Using heap-spraying techniques, an attacker could leverage the crash to execute arbitrary code. Please see Microsoft Security Advisory (977981).","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user.","resolution":"A complete solution is not available.","workarounds":"Disable Active scripting As noted in Microsoft Security Advisory (977981), consider disabling Active Scripting. Instructions for disabling Active scripting can be found in Microsoft Security Advisory (977981) and \"Securing Your Web Browser.\" Enable DEP As noted in Microsoft Security Advisory (977981), consider enabling Data Execution Prevention (DEP). Disabling scripting and enabling DEP do not resolve the vulnerability, but they greatly lower the chances of an attacker being able to execute arbitrary code. Use Internet Explorer 8 According to Microsoft Security Advisory (977981), Internet Explorer 8 is not affected.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by info@securitylab.ir and/or K4mr4n_st@yahoo.com.","author":"This document was written by Art Manion.","public":["http://www.microsoft.com/technet/security/advisory/977981.mspx","http://www.securityfocus.com/archive/1/507984/30/0/threaded","http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published","http://www.computerworld.com/s/article/9141278/New_attack_fells_Internet_Explorer","http://seclists.org/bugtraq/2009/Nov/148","http://blogs.msdn.com/ie/archive/2008/04/08/ie8-security-part-I_3A00_-dep-nx-memory-protection.aspx"],"cveids":["CVE-2009-3672"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-11-23T14:45:14Z","publicdate":"2009-11-20T00:00:00Z","datefirstpublished":"2009-11-25T00:01:29Z","dateupdated":"2009-11-27T19:09:24Z","revision":17,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"16","cam_impact":"15","cam_easeofexploitation":"13","cam_attackeraccessrequired":"20","cam_scorecurrent":"29.25","cam_scorecurrentwidelyknown":"35.1","cam_scorecurrentwidelyknownexploited":"58.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":29.25,"vulnote":null}