Executive Summary

Informations
Name CVE-2006-5579 First vendor Publication 2006-12-12
Vendor Cve Last vendor Modification 2011-10-03

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

Impacts Provides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5579

CWE : Common Weakness Enumeration

idName
CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:761
 
Oval ID: oval:org.mitre.oval:def:761
Title: Script Error Handling Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-5579
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Open Source Vulnerability Database (OSVDB)

idDescription
30813Microsoft IE Script Error Handling Memory Corruption

Nessus® Vulnerability Scanner

DateDescription
2006-12-12Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms06-072.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/21552
BUGTRAQ http://www.securityfocus.com/archive/1/archive/1/454205/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA06-346A.html
CERT-VN http://www.kb.cert.org/vuls/id/599832
HP http://www.securityfocus.com/archive/1/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/454969/100/200/threaded
MISC http://secunia.com/secunia_research/2006-58/advisory/
MS http://www.microsoft.com/technet/security/bulletin/ms06-072.mspx
OSVDB http://www.osvdb.org/30813
SECTRACK http://securitytracker.com/id?1017373
SECUNIA http://secunia.com/advisories/20807
VUPEN http://www.vupen.com/english/advisories/2006/4966

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:37:42
  • Multiple Updates
2013-05-11 11:12:58
  • Multiple Updates