CERT Advisory: Buffer Overflow in Microsoft Intern
Provides an overview and solutions to this vulnerability which, theoretically, affects all applications utilizing the Internet Explorer HTML rendering engine.
CIAC: Microsoft Internet Explorer-Content Type Fal
Detailed explanation and workaround of these vulnerabilities affecting I.E 5.5 and 6.
CNET: Buffer-overflow Bug in IE
"Microsoft is urging users of its Internet Explorer browser to download a patch for a newly discovered buffer-overflow security bug. The bug takes advantage of the way some versions of the IE browser handle long strings of JScript code."
Executing Arbitrary Commands Without Active Script
Advisory by GreyMagic Security explains how a vulnerability in elements can be exploited with data binding.
GreyMagic Security: Appendix to "IE allows un
Explains how the "ANALYZE.DLG" resource can be manipulated to allow the execution of arbitrary code in the My Computer" zone.
IE Clipboard Stealing
"Since Microsoft Internet Explorer ("IE") version 5.0, there has been a way to read and set the users clipboard text from script, by default, and with no prompting. This can be handy for web-based applications to do so, but can be used in a malicious way to steal the clipboard contents if the option is not changed."
Internet Explorer Security Pro
Internet Explorer Security is a utility that customizes aspects of the Internet Explorer Web browser.
Microsoft Internet Explorer 4.x 5.x - Frame Loop V
Advisory by USSR: "It is possible to create a malicious webpage that when visited by an IE user all of their system resources are devoured and depending on the system its possible that the machine can even crash and reboot itself."
Microsoft: Q167614 - Update Available For "Fr
An update that addresses a potential security issue with regard to the use of frames in Internet Explorer.
Privacy Secrets of MicroSoft's Internet Explo
Security and internet privacy issues of Global Histories, Cookies, and Cache while browsing with Mac Explorer 5.0
Retrieving Information on Local Files in IE
Explains how the IMG element's dynsrc attribute can be exploited to test the existence of, find the size of, find the date last updated/modified of, and the creation date of, an arbitrary local file. By GreyMagic Security.
Scott Schnoll's Internet Explorer Security
Information on Internet and web browser security as well as Microsoft Internet Explorer security features and flaws.
The Register: Cumulative IE Patch for Maicious Coo
A fairly serious flaw in Internet Explorer which would enable a malicious Web page or e-mail to drop a cookie containing an HTML script on a victim's machine and run it in the 'Local Computer' zone rather than the Internet zone to avoid restrictions has just been patched.
The Register: IE, Outlook Run Malicious Commands W
An attacker can run arbitrary commands on Windows machines with a simple bit of HTML, an Israeli security researcher has demonstrated. The exploit will work with IE, Outlook and Outlook Express even if active scripting and ActiveX are disabled in the browser security settings.
The Register: MS Security Patch Fails on Local Fil
The MS patch intended to fix a data binding flaw in IE, which enables a script to call executables on your Windows machine using the object tag, does not protect against malicious files launched from a local directory.
The Register: Three New MS Security Holes - Two Na
Includes: MSXML may ignore IE security zone settings during a request for data from a Web site; and a VBscript problem which allows an attacker to read files on a victim's local drive, or eavesdrop on his browsing session.
Unpatched IE Vulnerabilities
Unpatched vulnerabilities, references, and examples
Windows Security Guide: Internet Explorer
Descriptions, and patch information, for vulnerabilities affecting various versions of this browser.
Wired News: IE Bug Can Lead to Strange Search
Describes a security hole which can be exploited to change users' search sites or to serve up offensive ads.
Wired News: IE Hole Surrenders Your Computer
An attacker can gain control of another user's machine using an HTML-formatted e-mail with an attachment that contains a small remote-control program. The e-mail can be sent directly to the victim, or can be placed on a website.
Wired News: IE Hole-Finder in Odd Position
A hacker who discovered a potentially devastating security hole in Microsoft's Internet Explorer says he has found himself in the undesired position of providing technical support to people who cannot install the patch that Microsoft released to fix the flaw.