This attack could pose a moderate security threat. It does not require immediate action.
This signature detects attempts to exploit a vulnerability in Microsoft Internet Explorer which allows an attacker to issue a denial of service against the victims Internet Explorer Web browser.
A denial of service vulnerability has been identified in Internet Explorer that may allow remote attackers to cause an instance of the browser to crash.
The issue exists in the 'MSWebDVD' Object, which allows applications to control all aspects of DVD-Video navigation and playback. This object can be used to view DVD video via the web. It has been reported that the 'AcceptParentalLevelChange' function of 'MSWebDVD' does not properly verify user-supplied input. An attacker may cause a denial of service condition in an instance of Internet Explorer by evoking the method through a malicious site and sending an excessive string value (about 255 characters) in the following manner:
object.AcceptParentalLevelChange (boolean value),UserName as string,Password
Internet Explorer running in Windows XP has been reported to be affected by this issue, however, it is possible that other versions are affected as well.
Due to the nature of this issue, it has been conjectured that this vulnerability may be leveraged to execute arbitrary code. This has not been confirmed at the moment.
- Microsoft Internet Explorer 6.0, 6.0 SP1
Upgrade to the latest version of Microsoft Internet Explorer and apply all available patches.