Overview
Microsoft Internet Explorer (IE) does not safely reference CSS style elements. Using a specially crafted HTML page, an attacker can cause IE to crash and potentially execute arbitrary code.
Description
IE contains a vulnerability in the way it references CSS style elements. Processing a specially crafted HTML page could cause IE to access an invalid memory location and crash. Using heap-spraying techniques, an attacker could leverage the crash to execute arbitrary code. Please see Microsoft Security Advisory (977981).  | 
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user.  | 
Solution
A complete solution is not available.  | 
Disable Active scripting  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://www.microsoft.com/technet/security/advisory/977981.mspx
 - http://www.securityfocus.com/archive/1/507984/30/0/threaded
 - http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published
 - http://www.computerworld.com/s/article/9141278/New_attack_fells_Internet_Explorer
 - http://seclists.org/bugtraq/2009/Nov/148
 - http://blogs.msdn.com/ie/archive/2008/04/08/ie8-security-part-I_3A00_-dep-nx-memory-protection.aspx
 
Acknowledgements
This vulnerability was publicly disclosed by info@securitylab.ir and/or K4mr4n_st@yahoo.com.
This document was written by Art Manion.
Other Information
| CVE IDs: | CVE-2009-3672 | 
| Severity Metric: | 29.25 | 
| Date Public: | 2009-11-20 | 
| Date First Published: | 2009-11-25 | 
| Date Last Updated: | 2009-11-27 19:09 UTC | 
| Document Revision: | 17 |