CVE-2007-0099
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability."
Una condición de carrera en el módulo msxml3 de Microsoft XML Core Services versión 3.0, tal como es usado en Internet Explorer versión 6 y otras aplicaciones, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo de aplicación) por medio de muchas etiquetas anidadas en un documento XML en un IFRAME, cuando la representación de documentos sincrónicos se interrumpe con frecuencia con eventos asincrónicos, como es demostrado mediante un temporizador de JavaScript, que puede desencadenar una desreferencia de puntero NULL o corrupción de memoria, también se conoce como "MSXML Memory Corruption Vulnerability".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-01-08 CVE Reserved
- 2007-01-08 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0113.html | Mailing List | |
http://isc.sans.org/diary.php?storyid=2004 | X_refsource_misc | |
http://osvdb.org/32627 | Vdb Entry | |
http://seclists.org/fulldisclosure/2007/Jan/0110.html | Mailing List |
|
http://securitytracker.com/id?1021164 | Vdb Entry | |
http://www.securityfocus.com/archive/1/455965/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/455986/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/456343/100/0/threaded | Mailing List | |
http://www.us-cert.gov/cas/techalerts/TA08-316A.html | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5793 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/21872 | 2018-10-16 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=122703006921213&w=2 | 2018-10-16 | |
http://secunia.com/advisories/23655 | 2018-10-16 | |
http://www.vupen.com/english/advisories/2008/3111 | 2018-10-16 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Xml Core Services Search vendor "Microsoft" for product "Xml Core Services" | 3.0 Search vendor "Microsoft" for product "Xml Core Services" and version "3.0" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Internet Explorer Search vendor "Microsoft" for product "Internet Explorer" | 6 Search vendor "Microsoft" for product "Internet Explorer" and version "6" | - |
Affected
|