Description
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream header that triggers memory corruption, aka "Data Stream Header Corruption Vulnerability."
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Skylined · textremotewindows
https://www.exploit-db.com/exploits/9893
exploitdb
WORKING POC
VERIFIED
by Skylined · textremotewindows
https://www.exploit-db.com/exploits/33270
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054
US Government Resource third-party-advisory
x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA09-286A.html
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6454
Scores
CVSS v3
8.8
EPSS
0.2969
EPSS Percentile
96.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (10)
microsoft/internet_explorer
5.01 sp4
microsoft/internet_explorer
6 sp1 (2 CPE variants)
microsoft/internet_explorer
7
microsoft/internet_explorer
8
microsoft/windows_2000
microsoft/windows_7
microsoft/windows_server_2003
microsoft/windows_server_2008
(8 CPE variants)
microsoft/windows_vista
(6 CPE variants)
microsoft/windows_xp
(3 CPE variants)
Published
Oct 14, 2009
Tracked Since
Feb 18, 2026