source: https://www.securityfocus.com/bid/18900/info Microsoft Internet Explorer 6 is reportedly prone to a denial-of-service vulnerability because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers. This issue is triggered when an attacker convinces a victim to activate a malicious ActiveX control object. Remote attackers may exploit this issue to crash Internet Explorer 6, effectively denying service to legitimate users. A stack-based heap overflow may be possible; as a result, remote code could run in the context of the user running the affected application. This has not been confirmed. var a = new ActiveXObject('RDS.DataControl'); var b = "X"; while (b.length < (1024*256)) a.URL = (b+=b);