TITLE ===== Memory Corruption Vulnerability DESCRIPTION =========== Internet Explorer is the flagship broswer for the Microsoft Windows OS. PROBLEM ======= Affected Versions : Internet Explorer 5.x, 6.1 SP1 Tested Platforms : Windows 2k, Windows XP Internet Explorer is vulnerable to numerous security holes, and this one is not that big of a deal, but worth mentioning. This memory corruption vulnerability allows an attacker to DoS the application itself, no more no less. An attacker can shutdown Internet Explorer with only 11 bytes. DETAILS ======= [Cascading Style Sheet(CSS) Memory Corruption] There are 1001 ways that an attacker can use to hack, exploit, and crash IE but we believe this is one of the most compact attacks ever, as an attacker needs only 11 bytes to crash IE. This vulnerability does not give the attacker the ability to exploit and execute arbitrary code or cause any real damage to the victim, but rather it corrupts the memory space allocated by IE. There was a similar vulnerability which has been reported earlier, but this one is more compact. IE seems to have problems handling Cascading Style Sheet (CSS) elements and therefore an attacker can easily crash IE by using the following, imho, weird combinations of CSS elements: