CVE-2009-3672

N/A Unknown
Published: December 02, 2009 Modified: April 23, 2026
View on NVD

Description

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute arbitrary code via vectors involving a call to the getElementsByTagName method for the STYLE tag name, selection of the single element in the returned list, and a change to the outerHTML property of this element, related to Cascading Style Sheets (CSS) and mshtml.dll, aka "HTML Object Memory Corruption Vulnerability." NOTE: some of these details are obtained from third party information. NOTE: this issue was originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/37448
Source: secure@microsoft.com
Vendor Advisory
http://www.kb.cert.org/vuls/id/515749
Source: secure@microsoft.com
US Government Resource
http://www.microsoft.com/technet/security/advisory/977981.mspx
Source: secure@microsoft.com
Vendor Advisory
http://www.securityfocus.com/bid/37085
Source: secure@microsoft.com
Exploit
http://www.securitytracker.com/id?1023293
Source: secure@microsoft.com
http://www.us-cert.gov/cas/techalerts/TA09-342A.html
Source: secure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2009/3301
Source: secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/37448
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.kb.cert.org/vuls/id/515749
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.microsoft.com/technet/security/advisory/977981.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/507984/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37085
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securitytracker.com/id?1023293
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-342A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2009/3301
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
81.6%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft