This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer.
Microsoft Internet Explorer is a web browser available for Microsoft Windows.
Internet Explorer is prone to a remote memory-corruption vulnerability. This issue occurs when parsing cascading style sheet (CSS) expressions in web pages. Specifically, the issue is triggered when specially crafted '@import url()' statements are parsed, which may result in a use-after-free condition within the "mshtml.dll" library.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the application. Failed exploit attempts will result in denial-of-service conditions.
Internet Explorer versions 6 and 8 are vulnerable.
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: firstname.lastname@example.org.