A double-free vulnerability in Microsoft's Internet Explorer (IE) web browser could allow a remote attacker to cause a denial-of-service condition or execute arbitrary code on a vulnerable system.
Microsoft Internet Explorer (IE) is a web browser. A double-free vulnerability has been discovered in the way that Internet Explorer processes GIF image files. When processing GIF image files, the routine responsible for freeing memory may attempt to free the same memory reference more than once. Deallocating the already freed memory can lead to memory corruption, which could cause a denial-of-service condition or potentially be leveraged by an attacker to execute arbitrary code.
A remote attacker may be able to cause a denial of service or potentially execute arbitrary code on a vulnerable system by introducing a specially crafted GIF file. This malicious GIF image may be introduced to the system via a malicious web page, HTML email, or an email attachment.
Apply a patch as described in Microsoft Security Bulletin MS04-025.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: July 30, 2004
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please refer to Microsoft Security Bulletin MS04-025.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was reported by Marc Ruef.
This document was written by Damon Morda.
CVE IDs: | CVE-2003-1048
Severity Metric:** | 25.31
Date Public: | 2003-09-02
Date First Published: | 2004-07-30
Date Last Updated: | 2004-08-03 17:32 UTC
Document Revision: | 15