=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2007/VULN504
_____________________________________________________________________

DATE                      : 12/12/2007

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running IE v 5.01, IE v6, IE v7.

======================================================================
http://www.microsoft.com/technet/security/bulletin/ms07-069.mspx
______________________________________________________________________

Microsoft Security Bulletin MS07-069 - Critical
Cumulative Security Update for Internet Explorer (942615)

This critical security update resolves four privately reported
vulnerabilities. The most serious security impact could allow remote
code execution if a user viewed a specially crafted Web page using
Internet Explorer. Users whose accounts are configured to have fewer
user rights on the system could be less impacted than users who operate
with administrative user rights.

The security update is rated moderate for Internet Explorer 6 and 7 on
Windows Server 2003. For all other supported releases of Internet
Explorer, this security update is rated critical.

The security update addresses these vulnerabilities by modifying the way
that Internet Explorer handles access to freed memory.


Affected Software

     Internet Explorer 5.01 and Internet Explorer 6 Service Pack 1	 	 	 	
     Internet Explorer 7	 	 	 	


Vulnerability Information
	
Uninitialized Memory Corruption Vulnerability
CVE-2007-3902

A remote code execution vulnerability exists in the way Internet
Explorer accesses an object that has not been correctly initialized or
that has been deleted. An attacker could exploit the vulnerability by
constructing a specially crafted Web page. When a user views the Web
page, the vulnerability could allow remote code execution. An attacker
who successfully exploited this vulnerability could gain the same user
rights as the logged on user.

Uninitialized Memory Corruption Vulnerability
CVE-2007-3903

A remote code execution vulnerability exists in the way Internet
Explorer accesses an object that has not been correctly initialized or
that has been deleted. An attacker could exploit the vulnerability by
constructing a specially crafted Web page. When a user views the Web
page, the vulnerability could allow remote code execution. An attacker
who successfully exploited this vulnerability could gain the same user
rights as the logged on user.

Uninitialized Memory Corruption Vulnerability
CVE-2007-5344

A remote code execution vulnerability exists in the way Internet
Explorer accesses an object that has not been correctly initialized or
that has been deleted. An attacker could exploit the vulnerability by
constructing a specially crafted Web page. When a user views the Web
page, the vulnerability could allow remote code execution. An attacker
who successfully exploited this vulnerability could gain the same user
rights as the logged on user.
	
DHTML Object Memory Corruption Vulnerability
CVE-2007-5347

A remote code execution vulnerability exists in the way Internet
Explorer displays a Web page that contains certain unexpected method
calls to HTML objects. As a result, system memory may be corrupted in
such a way that an attacker could execute arbitrary code if a user
visited a specially crafted Web site. An attacker who successfully
exploited this vulnerability could gain the same user rights as the
logged on user.


======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================




