Note: This page is part of the archive.

This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact if you have any questions about the US-CERT website archive.

Alert (SA06-262A)

Microsoft Internet Explorer VML Vulnerability

Systems Affected

  • Microsoft Windows
  • Microsoft Internet Explorer


A vulnerability in Microsoft Internet Explorer could allow an attacker to take control of your computer.


Apply Update

Microsoft has provided an update to address this vulnerability. To obtain this update, visit the Microsoft Update web site.

We also recommend enabling Automatic Updates.

Until the update can be applied, consider the following workarounds.

Disable Binary and Script Behaviors

Follow the steps in Microsoft Security Advisory (925568) under the section titled "Configure Internet Explorer 6 for Microsoft Windows XP Service Pack 2 to disable Binary and Script Behaviors in the Internet and Local Intranet security zone."

Do not follow unsolicited links

Do not click on unsolicited URLs, including those received in email, instant messages, web forums, or internet relay chat (IRC) channels.


An attacker could exploit a vulnerability in Internet Explorer Vector Markup Language (VML) by convincing a user to open an HTML document such as a web site or an HTML email message. The attacker could then take any action as the user, including installing malicious software and accessing sensitive personal information.

For more technical information, see Vulnerability Note VU#416092.



Revision History

  • September 19, 2006: Initial release
    September 26, 2006: Added update information and added a reference to Microsoft's update

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No