Executive Summary
Informations | |||
---|---|---|---|
Name | MS06-021 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cumulative Security Update for Internet Explorer (916281) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
29 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
14 % | CWE-399 | Resource Management Errors |
14 % | CWE-264 | Permissions, Privileges, and Access Controls |
14 % | CWE-200 | Information Exposure |
14 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
14 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1078 | |||
Oval ID: | oval:org.mitre.oval:def:1078 | ||
Title: | Exception Handling Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1135 | |||
Oval ID: | oval:org.mitre.oval:def:1135 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1167 | |||
Oval ID: | oval:org.mitre.oval:def:1167 | ||
Title: | MHT Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1414 | |||
Oval ID: | oval:org.mitre.oval:def:1414 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (Win2K) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1423 | |||
Oval ID: | oval:org.mitre.oval:def:1423 | ||
Title: | MHT Memory Corruption Vulnerability (WinS03) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1478 | |||
Oval ID: | oval:org.mitre.oval:def:1478 | ||
Title: | Address Bar Spoofing Vulnerability (WinS03) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1556 | |||
Oval ID: | oval:org.mitre.oval:def:1556 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (S03,SP1) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1567 | |||
Oval ID: | oval:org.mitre.oval:def:1567 | ||
Title: | Address Bar Spoofing Vulnerability (Win2K) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1600 | |||
Oval ID: | oval:org.mitre.oval:def:1600 | ||
Title: | Flash Address Bar Spoofing Vulnerability (Win2K) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1604 | |||
Oval ID: | oval:org.mitre.oval:def:1604 | ||
Title: | Flash Address Bar Spoofing Vulnerability (64-bit XP) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1609 | |||
Oval ID: | oval:org.mitre.oval:def:1609 | ||
Title: | MHT Memory Corruption Vulnerability (WinXP,SP2) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1621 | |||
Oval ID: | oval:org.mitre.oval:def:1621 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (2K/XP) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1646 | |||
Oval ID: | oval:org.mitre.oval:def:1646 | ||
Title: | Address Bar Spoofing Vulnerability (64-bit XP) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1665 | |||
Oval ID: | oval:org.mitre.oval:def:1665 | ||
Title: | MHT Memory Corruption Vulnerability (2K/XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1686 | |||
Oval ID: | oval:org.mitre.oval:def:1686 | ||
Title: | Address Bar Spoofing Vulnerability (XP,SP2) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1728 | |||
Oval ID: | oval:org.mitre.oval:def:1728 | ||
Title: | Exception Handling Memory Corruption Vulnerability (WinS03) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1752 | |||
Oval ID: | oval:org.mitre.oval:def:1752 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (WinS03) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1765 | |||
Oval ID: | oval:org.mitre.oval:def:1765 | ||
Title: | Exception Handling Memory Corruption Vulnerability (2K/XP) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1767 | |||
Oval ID: | oval:org.mitre.oval:def:1767 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (Win2K) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1768 | |||
Oval ID: | oval:org.mitre.oval:def:1768 | ||
Title: | Exception Handling Memory Corruption Vulnerability (XP,SP2) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1775 | |||
Oval ID: | oval:org.mitre.oval:def:1775 | ||
Title: | Address Bar Spoofing Vulnerability (2K/XP) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1788 | |||
Oval ID: | oval:org.mitre.oval:def:1788 | ||
Title: | Address Bar Spoofing Vulnerability (S03,SP1) | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2384 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1800 | |||
Oval ID: | oval:org.mitre.oval:def:1800 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (Win2K) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1806 | |||
Oval ID: | oval:org.mitre.oval:def:1806 | ||
Title: | Flash Address Bar Spoofing Vulnerability (WinS03) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1821 | |||
Oval ID: | oval:org.mitre.oval:def:1821 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1830 | |||
Oval ID: | oval:org.mitre.oval:def:1830 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (XP,SP2) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1838 | |||
Oval ID: | oval:org.mitre.oval:def:1838 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (XP,SP2) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1842 | |||
Oval ID: | oval:org.mitre.oval:def:1842 | ||
Title: | Flash Address Bar Spoofing Vulnerability (XP,SP2) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1845 | |||
Oval ID: | oval:org.mitre.oval:def:1845 | ||
Title: | Exception Handling Memory Corruption Vulnerability (Win2k) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1862 | |||
Oval ID: | oval:org.mitre.oval:def:1862 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (64-bit XP) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1881 | |||
Oval ID: | oval:org.mitre.oval:def:1881 | ||
Title: | Flash Address Bar Spoofing Vulnerability (2K/XP) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1891 | |||
Oval ID: | oval:org.mitre.oval:def:1891 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (XP,SP2) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1906 | |||
Oval ID: | oval:org.mitre.oval:def:1906 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (S03,SP1) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1911 | |||
Oval ID: | oval:org.mitre.oval:def:1911 | ||
Title: | MHT Memory Corruption Vulnerability (Win2K) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1914 | |||
Oval ID: | oval:org.mitre.oval:def:1914 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (2K/XP) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1916 | |||
Oval ID: | oval:org.mitre.oval:def:1916 | ||
Title: | MHT Memory Corruption Vulnerability (64-bit XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2385 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1918 | |||
Oval ID: | oval:org.mitre.oval:def:1918 | ||
Title: | Flash Address Bar Spoofing Vulnerability (S03,SP1) | ||
Description: | Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1626 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1924 | |||
Oval ID: | oval:org.mitre.oval:def:1924 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (Win2K) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1928 | |||
Oval ID: | oval:org.mitre.oval:def:1928 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (64-bit XP) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1931 | |||
Oval ID: | oval:org.mitre.oval:def:1931 | ||
Title: | HTML Decoding Memory Corruption Vulnerability (XP,SP2) | ||
Description: | Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2382 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1944 | |||
Oval ID: | oval:org.mitre.oval:def:1944 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (2K/XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1949 | |||
Oval ID: | oval:org.mitre.oval:def:1949 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (WinS03) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1961 | |||
Oval ID: | oval:org.mitre.oval:def:1961 | ||
Title: | Exception Handling Memory Corruption Vulnerability(64-bit XP) | ||
Description: | Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2218 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1973 | |||
Oval ID: | oval:org.mitre.oval:def:1973 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (2K/XP) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1977 | |||
Oval ID: | oval:org.mitre.oval:def:1977 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (64-bit XP) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1985 | |||
Oval ID: | oval:org.mitre.oval:def:1985 | ||
Title: | CSS Cross-Domain Information Disclosure Vulnerability (WinS03) | ||
Description: | Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-4089 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:2009 | |||
Oval ID: | oval:org.mitre.oval:def:2009 | ||
Title: | ActiveX Control Memory Corruption Vulnerability (64-bit XP) | ||
Description: | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2383 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:2017 | |||
Oval ID: | oval:org.mitre.oval:def:2017 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability (WinS03) | ||
Description: | Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1303 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
27475 | Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. This issue is caused by a memory corruption error within the handling of certain "exceptional conditions". The error occurs in mshtml.dll when the browser encounters a set of nested OBJECT tags which triggers a NULL dereference. |
26446 | Microsoft IE Multipart HTML File Save Memory Corruption Microsoft Internet Explorer contains a flaw that allows remote code execution via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. |
26445 | Microsoft IE Modal Browser Window Address Bar Spoofing Microsoft Internet Explorer contains a flaw that may allow a malicious user to spoof the information in the address bar in a way that preserves the original address bar and trusted UI of a trusted site even after the browser has been navigated to a malicious site. It is possible that the flaw may allow phishing attacks or loss of integrity. |
26444 | Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution Microsoft IE contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered due to an error in the parameter validation in the DXImageTransform.Microsoft.Light ActiveX control. It is possible that the flaw may allow arbitrary code execution when a user e.g. visits a malicious web site resulting in a loss of integrity. |
26443 | Microsoft IE UTF-8 Encoded HTML Overflow A remote overflow exists in Microsoft IE. Internet Explorer fails to translate UTF-8 characters to Unicode resulting in an encoded HTML overflow. With a specially crafted request, an attacker can cause remote code execution resulting in a loss of integrity. |
26442 | Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption Windows contains an unspecified flaw in Internet Explorer related to the handling of ActiveX controls by the Wmm2fxa.ddl component that may allow an attacker to execute arbitrary code. No further details have been provided. |
24966 | Microsoft IE object Tag Memory Corruption Arbitrary Code Execution |
24465 | Microsoft IE Window Loading Race Condition Address Bar Spoofing |
21532 | Microsoft IE CSS @import Directive Cross Domain Information Disclosure |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ... RuleID : 6687 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect2Inputs... RuleID : 6686 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.MMSpecialEffect2Inputs ActiveX CLSID unicode access RuleID : 6685 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffectInplace... RuleID : 6684 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX CLSID unicode access RuleID : 6683 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect2Inputs... RuleID : 6682 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ... RuleID : 6681 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | Windows Media Transform Effects ActiveX CLSID unicode access RuleID : 6680 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | DXImageTransform.Microsoft.Light ActiveX function call access RuleID : 6519 - Revision : 4 - Type : WEB-CLIENT |
2014-01-10 | DXImageTransform.Microsoft.Light ActiveX CLSID unicode access RuleID : 6518 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX clsid ac... RuleID : 6517 - Revision : 13 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX function... RuleID : 6516 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-23 | Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffectInplace... RuleID : 29037 - Revision : 3 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer address bar spoofing attempt RuleID : 28663 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer address bar spoofing attempt RuleID : 28662 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer address bar spoofing attempt RuleID : 17726 - Revision : 14 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CSS import cross-domain restriction bypass attempt RuleID : 17312 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CSS import cross-domain restriction bypass attempt RuleID : 17311 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer HTML Decoding memory corruption attempt RuleID : 16032 - Revision : 12 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer nested object tag memory corruption attempt RuleID : 16031 - Revision : 13 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-06-13 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms06-021.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:22 |
|
2014-01-23 21:20:30 |
|
2014-01-19 21:29:58 |
|