Executive Summary

Informations
NameCVE-2006-5579First vendor Publication2006-12-12
VendorCveLast vendor Modification2011-10-03

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5579

CWE : Common Weakness Enumeration

idName
CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:761
 
Oval ID: oval:org.mitre.oval:def:761
Title: Script Error Handling Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-5579
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Open Source Vulnerability Database (OSVDB)

idDescription
30813Microsoft IE Script Error Handling Memory Corruption

Nessus® Vulnerability Scanner

DateDescription
2006-12-12Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms06-072.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/21552
BUGTRAQhttp://www.securityfocus.com/archive/1/archive/1/454205/100/0/threaded
CERThttp://www.us-cert.gov/cas/techalerts/TA06-346A.html
CERT-VNhttp://www.kb.cert.org/vuls/id/599832
HPhttp://www.securityfocus.com/archive/1/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/454969/100/200/threaded
MISChttp://secunia.com/secunia_research/2006-58/advisory/
MShttp://www.microsoft.com/technet/security/bulletin/ms06-072.mspx
OSVDBhttp://www.osvdb.org/30813
SECTRACKhttp://securitytracker.com/id?1017373
SECUNIAhttp://secunia.com/advisories/20807
VUPENhttp://www.vupen.com/english/advisories/2006/4966

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:37:42
  • Multiple Updates
2013-05-11 11:12:58
  • Multiple Updates