This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer that uses a malformed HTML file. An attacker could exploit the vulnerability by constructing a specially crafted HTML file that could allow remote code execution.
Microsoft Internet Explorer is prone to an unspecified memory-corruption vulnerability.
An attacker could exploit this issue via a malicious web page to potentially execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely crash the affected application. Attackers could exploit this issue by crafting a malicious web page designed to leverage the vulnerability.
The issue occurs because Internet Explorer allows objects to register exception handlers that fail to handle certain conditions properly. If a malicious web page designed to exploit this vulnerability is viewed, memory corruption could occur due to unsafe exception handling.
This issue is reportedly a variant of BID 17658 (Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption Vulnerability). Further details are currently unavailable. This BID will be updated as more information is disclosed.
- Microsoft Internet Explorer 5.0.1 SP4, 6.0, 6.0 SP1, 6.0 SP2