Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
2008-04-08T23:05:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | microsoft | ie | 5.01 | Yes |
Application | microsoft | ie | 6 | Yes |
Application | microsoft | ie | 6 | Yes |
Application | microsoft | ie | 6 | Yes |
Application | microsoft | ie | 7 | Yes |
Application | microsoft | ie | 7 | Yes |
Application | microsoft | ie | 7 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |