Executive Summary

Informations
NameCVE-2006-5579First vendor Publication2006-12-12
VendorCveLast vendor Modification2011-10-03

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5579

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:761
 
Oval ID: oval:org.mitre.oval:def:761
Title: Script Error Handling Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-5579
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Open Source Vulnerability Database (OSVDB)

idDescription
30813Microsoft IE Script Error Handling Memory Corruption

Nessus® Vulnerability Scanner

DateDescription
2006-12-12Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms06-072.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/21552
BUGTRAQ http://www.securityfocus.com/archive/1/archive/1/454205/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA06-346A.html
CERT-VN http://www.kb.cert.org/vuls/id/599832
HP http://www.securityfocus.com/archive/1/archive/1/454969/100/200/threaded
MS http://www.microsoft.com/technet/security/bulletin/ms06-072.mspx
OSVDB http://www.osvdb.org/30813
SECTRACK http://securitytracker.com/id?1017373
VUPEN http://www.vupen.com/english/advisories/2006/4966

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2016-04-26 15:14:19
  • Multiple Updates
2014-02-17 10:37:42
  • Multiple Updates
2013-05-11 11:12:58
  • Multiple Updates