TITLE: Internet Explorer Multiple Event Handlers Denial of Service Weakness SECUNIA ADVISORY ID: SA19269 VERIFY ADVISORY: http://secunia.com/advisories/19269/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote SOFTWARE: Microsoft Internet Explorer 6.x http://secunia.com/product/11/ DESCRIPTION: Michal Zalewski has discovered a weakness in Internet Explorer, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an array boundary error in the handling of HTML tags with multiple event handlers. This can be exploited to crash a vulnerable browser via a HTML tag with 94 or more event handlers. The weakness has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2. SOLUTION: Do not visit untrusted web sites. PROVIDED AND/OR DISCOVERED BY: Michal Zalewski ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------