Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-2383 | First vendor Publication | 2006-06-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2383 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1821 | |||
Oval ID: | oval:org.mitre.oval:def:1821 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1891 | |||
Oval ID: | oval:org.mitre.oval:def:1891 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (XP,SP2) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1924 | |||
Oval ID: | oval:org.mitre.oval:def:1924 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (Win2K) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1944 | |||
Oval ID: | oval:org.mitre.oval:def:1944 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (2K/XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1949 | |||
Oval ID: | oval:org.mitre.oval:def:1949 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (WinS03) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:2009 | |||
Oval ID: | oval:org.mitre.oval:def:2009 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (64-bit XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
26444 | Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution Microsoft IE contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered due to an error in the parameter validation in the DXImageTransform.Microsoft.Light ActiveX control. It is possible that the flaw may allow arbitrary code execution when a user e.g. visits a malicious web site resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ... RuleID : 6687 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect2Inputs... RuleID : 6686 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.MMSpecialEffect2Inputs ActiveX CLSID unicode access RuleID : 6685 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffectInplace... RuleID : 6684 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX CLSID unicode access RuleID : 6683 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect2Inputs... RuleID : 6682 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ... RuleID : 6681 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | Windows Media Transform Effects ActiveX CLSID unicode access RuleID : 6680 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | DXImageTransform.Microsoft.Light ActiveX function call access RuleID : 6519 - Revision : 4 - Type : WEB-CLIENT |
2014-01-10 | DXImageTransform.Microsoft.Light ActiveX CLSID unicode access RuleID : 6518 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX clsid ac... RuleID : 6517 - Revision : 13 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX function... RuleID : 6516 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-23 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffectInplace... RuleID : 29037 - Revision : 3 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-06-13 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms06-021.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:16 |
|
2024-11-28 12:08:56 |
|
2021-07-27 00:24:35 |
|
2021-07-24 01:44:13 |
|
2021-07-24 01:02:34 |
|
2021-07-23 17:24:39 |
|
2021-05-04 12:04:02 |
|
2021-04-22 01:04:36 |
|
2020-05-23 00:17:47 |
|
2018-10-13 00:22:34 |
|
2017-10-11 09:23:41 |
|
2017-07-20 09:23:35 |
|
2016-06-28 15:47:13 |
|
2016-04-26 14:37:30 |
|
2014-02-17 10:35:51 |
|
2014-01-19 21:23:19 |
|
2013-05-11 10:57:07 |
|