Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2008-04-08T23:00:00

Updated: 2024-08-07T08:08:57.611Z

Reserved: 2008-02-28T00:00:00

Link: CVE-2008-1085

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-04-08T23:05:00.000

Modified: 2018-10-12T21:45:12.413

Link: CVE-2008-1085

cve-icon Redhat

No data.