Description: | | A vulnerability has been reported in several Symantec products. One of the dynamic link libraries installed by the vulnerable product contains a remotely scriptable ActiveX object which lacks proper input data validation mechanisms. An attacker may instantiate the vulnerable object and supply malicious input data to its function to cause stack exhaustion. The application directly affected by this vulnerability is Internet Explorer, not the affected Symantec product. However, Internet Explorer forks to a new thread when processing embedded script code. As a result, a successful attack only affects the thread created to process the script code embedded in the HTML document. The main thread is not affected during the attack, therefore no unusual behaviour occurs. No other application or service are affected by an exploitation attempt. A remote code injection and execution attack is not possible using this vulnerability. |