This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within CDOMStringDataList::InitFromString. By manipulating a documentβs elements an attacker can read outside the bounds of an allocated chunk. An attacker can leverage this vulnerability to leak arbitrary memory.