Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-1189 | First vendor Publication | 2006-04-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1189 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1020 | |||
Oval ID: | oval:org.mitre.oval:def:1020 | ||
Title: | IE6 Double Byte Character Parsing Memory Corruption (WinXP) | ||
Description: | Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1189 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1484 | |||
Oval ID: | oval:org.mitre.oval:def:1484 | ||
Title: | IE6 Double Byte Character Parsing Memory Corruption(Server 2003) | ||
Description: | Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1189 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:792 | |||
Oval ID: | oval:org.mitre.oval:def:792 | ||
Title: | IE6 Double Byte Character Parsing Memory Corruption (Win2K/WinXP) | ||
Description: | Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1189 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
ExploitDB Exploits
id | Description |
---|---|
2010-09-20 | Internet Explorer createTextRange() Code Execution |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
24541 | Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft DT DDS OrgChart GDD Route ActiveX object access RuleID : 6008 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT DDS OrgChart GDD Layout ActiveX object access RuleID : 6007 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT Icon Control ActiveX object access RuleID : 6006 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT DDS Straight Line Routing Logic 2 ActiveX obje... RuleID : 6005 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT DDS Circular Auto Layout Logic 2 ActiveX objec... RuleID : 6004 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT DDS Rectilinear GDD Route ActiveX object access RuleID : 6003 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DT DDS Rectilinear GDD Layout ActiveX object access RuleID : 6002 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 18313 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 17263 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 17262 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 17261 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 16690 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer createTextRange code execution attempt RuleID : 16035 - Revision : 12 - Type : BROWSER-IE |
2014-01-10 | DirectAnimation.DAstatics ActiveX function call unicode access RuleID : 11246 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DirectAnimation.DAstatics ActiveX function call a... RuleID : 11245 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | DirectAnimation.DAstatics ActiveX clsid unicode access RuleID : 11244 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DirectAnimation.DAstatics ActiveX clsid access RuleID : 11243 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.Redirect ActiveX function call unicode access RuleID : 11242 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | DXImageTransform.Microsoft.Redirect ActiveX function call access RuleID : 11241 - Revision : 10 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.Redirect ActiveX clsid unicode access RuleID : 11240 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | DXImageTransform.Microsoft.Redirect ActiveX clsid access RuleID : 11239 - Revision : 11 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-04-11 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms06-013.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:45 |
|
2024-11-28 12:08:29 |
|
2021-07-27 00:24:36 |
|
2021-07-24 01:44:13 |
|
2021-07-24 01:02:25 |
|
2021-07-23 17:24:40 |
|
2021-05-04 12:03:47 |
|
2021-04-22 01:04:20 |
|
2020-05-23 00:17:30 |
|
2018-10-13 00:22:33 |
|
2017-11-09 12:02:01 |
|
2017-10-11 09:23:38 |
|
2017-07-20 09:23:25 |
|
2016-04-26 14:23:47 |
|
2014-02-17 10:35:00 |
|
2013-05-11 10:51:20 |
|