This vulnerability consists of potentially hazardous use of memory on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer performs hyphenation of text on web pages. By presenting a specially formed web page to the browser, an attacker can cause Internet Explorer to access memory past the end of a buffer. This may give an attacker the ability to improperly influence the behavior of the browser.