Executive Summary

Informations
Name MS06-042 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cumulative Security Update for Internet Explorer (918899)

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-20 Improper Input Validation
25 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:171
 
Oval ID: oval:org.mitre.oval:def:171
Title: Window Location Information Disclosure Vulnerability
Description: Microsoft Internet Explorer 5.01 and 6 allows certain script to persist across navigations between pages, which allows remote attackers to obtain the window location of visited web pages in other domains or zones, aka "Window Location Information Disclosure Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-3640
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:433
 
Oval ID: oval:org.mitre.oval:def:433
Title: HTML Layout and Positioning Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file.
Family: windows Class: vulnerability
Reference(s): CVE-2006-3450
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:462
 
Oval ID: oval:org.mitre.oval:def:462
Title: FTP Server Command Injection Vulnerability
Description: CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
Family: windows Class: vulnerability
Reference(s): CVE-2004-1166
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5
 
Oval ID: oval:org.mitre.oval:def:5
Title: CSS Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5 SP4 and 6 do not properly garbage collect when "multiple imports are used on a styleSheets collection" to construct a chain of Cascading Style Sheets (CSS), which allows remote attackers to execute arbitrary code via unspecified vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2006-3451
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:502
 
Oval ID: oval:org.mitre.oval:def:502
Title: HTML Rendering Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle various HTML layout component combinations, which allows user-assisted remote attackers to execute arbitrary code via a crafted HTML file that leads to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-3637
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:577
 
Oval ID: oval:org.mitre.oval:def:577
Title: Source Element Cross-Domain Vulnerability
Description: Microsoft Internet Explorer 5.01 and 6 does not properly identify the originating domain zone when handling redirects, which allows remote attackers to read cross-domain web pages and possibly execute code via unspecified vectors involving a crafted web page, aka "Source Element Cross-Domain Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-3639
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:719
 
Oval ID: oval:org.mitre.oval:def:719
Title: COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01 and 6 does not properly handle uninitialized COM objects, which allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code, as demonstrated by the Nth function in the DirectAnimation.DATuple ActiveX control, aka "COM Object Instantiation Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-3638
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:738
 
Oval ID: oval:org.mitre.oval:def:738
Title: Redirect Cross-Domain Information Disclosure Vulnerability
Description: Cross-domain vulnerability in Microsoft Internet Explorer 6.0 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, aka "Redirect Cross-Domain Information Disclosure Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2006-3280
Version: 10
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Application 8
Os 1
Os 5
Os 3

Open Source Vulnerability Database (OSVDB)

Id Description
30834 Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow

A remote buffer overflow exists in URLMON.DLL of Microsoft Internet Explorer. The browser fails to check the bounds on long URLs when using the HTTP 1.1 protocol and GZip compression resulting in a heap-based buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code resulting in a loss of integrity.
28132 Microsoft IE HTTP 1.1 URL Parsing Overflow

A remote overflow exists in Microsoft's Internet Explorer. Internet Explorer fails to correctly handle a long URL using HTTP 1.1 compression resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity.
27855 Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution

Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user accesses a malicious web site that contains JavaScript. It is possible that the flaw may allow to execute arbitrary code resulting in a loss of integrity.
27854 Microsoft IE Chained CSS Imports Memory Corruption

Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user visits a malicious web page that contains chained cascading style sheets (CSS). It is possible that the flaw may allow to execute arbitrary code resulting in a loss of integrity.
27853 Microsoft IE HTML Rendering Memory Corruption

Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user visits a specially crafted web site that contains plain HTML. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.
27852 Microsoft IE Uninitialized COM Object Memory Corruption

Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute code on a user's machine. The issue is triggered when user accesses a malicious web page that contains instructions to instantiate an activeX control. It is possible that the flaw may allow execute code resulting in a loss of integrity.
27851 Microsoft IE Redirect Handling Cross-Domain Privilege Escalation

Microsoft Internet Explorer contains a flaw that may allow a malicious user to read cross-domain web pages and possibly execute code via unspecified vectors involving a specially crafted web page. It is possible that the flaw may allow execution of code resulting in a loss of integrity.
27850 Microsoft IE Cross Site Window Location Information Disclosure

Microsoft Internet Explorer contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when a user accesses a web page that contains a malicious script that persists across navigation between pages, which will disclose window location of visited web pages in other domains resulting in a loss of confidentiality.
26956 Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure

12299 Microsoft IE FTP URL Arbitrary Command Injection

Internet Explorer contains a flaw that will allow an attacker to inject arbitrary FTP commands. The problem is that the Internet Explorer URL FTP request is not verified properly and will allow an attacker to inject or manipulate FTP commands, resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 DXImageTransform.Microsoft.NDFXArtEffects ActiveX function call access
RuleID : 8425 - Revision : 13 - Type : BROWSER-PLUGINS
2014-01-10 DXImageTransform.Microsoft.NDFXArtEffects ActiveX CLSID unicode access
RuleID : 7915 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 DXImageTransform.Microsoft.NDFXArtEffects ActiveX clsid access
RuleID : 7914 - Revision : 13 - Type : BROWSER-PLUGINS
2014-01-10 WM VIH2 Fix ActiveX CLSID unicode access
RuleID : 7501 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WM VIH2 Fix ActiveX clsid access
RuleID : 7500 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WM TV Out Smooth Picture Filter ActiveX CLSID unicode access
RuleID : 7499 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WM TV Out Smooth Picture Filter ActiveX clsid access
RuleID : 7498 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Volume ActiveX CLSID unicode access
RuleID : 7497 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Volume ActiveX clsid access
RuleID : 7496 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Virtual Source ActiveX CLSID unicode access
RuleID : 7495 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Virtual Source ActiveX clsid access
RuleID : 7494 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Virtual Renderer ActiveX CLSID unicode access
RuleID : 7493 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Virtual Renderer ActiveX clsid access
RuleID : 7492 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Switch Filter ActiveX CLSID unicode access
RuleID : 7491 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Switch Filter ActiveX clsid access
RuleID : 7490 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Screen capture Filter ActiveX CLSID unicode access
RuleID : 7489 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Screen capture Filter ActiveX clsid access
RuleID : 7488 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Screen Capture Filter Task Page ActiveX CLSID unicode access
RuleID : 7487 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Screen Capture Filter Task Page ActiveX clsid...
RuleID : 7486 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Sample Info Filter ActiveX CLSID unicode access
RuleID : 7485 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Sample Info Filter ActiveX clsid access
RuleID : 7484 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT MuxDeMux Filter ActiveX CLSID unicode access
RuleID : 7483 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT MuxDeMux Filter ActiveX clsid access
RuleID : 7482 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Log Filter ActiveX CLSID unicode access
RuleID : 7481 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Log Filter ActiveX clsid access
RuleID : 7480 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Interlacer ActiveX CLSID unicode access
RuleID : 7479 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Interlacer ActiveX clsid access
RuleID : 7478 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Import Filter ActiveX CLSID unicode access
RuleID : 7477 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Import Filter ActiveX clsid access
RuleID : 7476 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT FormatConversion ActiveX CLSID unicode access
RuleID : 7475 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT FormatConversion ActiveX clsid access
RuleID : 7474 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT FormatConversion Prop Page ActiveX CLSID unicode access
RuleID : 7473 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT FormatConversion Prop Page ActiveX clsid access
RuleID : 7472 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT DV Extract Filter ActiveX CLSID unicode access
RuleID : 7471 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT DV Extract Filter ActiveX clsid access
RuleID : 7470 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT DirectX Transform Wrapper ActiveX CLSID unicode access
RuleID : 7469 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT DirectX Transform Wrapper ActiveX clsid access
RuleID : 7468 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT DeInterlace Prop Page ActiveX CLSID unicode access
RuleID : 7467 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT DeInterlace Prop Page ActiveX clsid access
RuleID : 7466 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT DeInterlace Filter ActiveX CLSID unicode access
RuleID : 7465 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT DeInterlace Filter ActiveX clsid access
RuleID : 7464 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Black Frame Generator ActiveX CLSID unicode access
RuleID : 7463 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Black Frame Generator ActiveX clsid access
RuleID : 7462 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WMT Audio Analyzer ActiveX CLSID unicode access
RuleID : 7461 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WMT Audio Analyzer ActiveX clsid access
RuleID : 7460 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Wmm2fxb.dll ActiveX CLSID unicode access
RuleID : 7459 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Wmm2fxb.dll ActiveX clsid access
RuleID : 7458 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Wmm2fxa.dll ActiveX CLSID unicode access
RuleID : 7457 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Wmm2fxa.dll ActiveX clsid access
RuleID : 7456 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Wmm2ae.dll ActiveX CLSID unicode access
RuleID : 7455 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Wmm2ae.dll ActiveX clsid access
RuleID : 7454 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 WM Color Converter Filter ActiveX CLSID unicode access
RuleID : 7453 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer WM Color Converter Filter ActiveX clsid access
RuleID : 7452 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Stetch ActiveX CLSID unicode access
RuleID : 7451 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Stetch ActiveX clsid access
RuleID : 7450 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 ShotDetect ActiveX CLSID unicode access
RuleID : 7449 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer ShotDetect ActiveX clsid access
RuleID : 7448 - Revision : 12 - Type : BROWSER-PLUGINS
2014-01-10 Record Queue ActiveX CLSID unicode access
RuleID : 7447 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Record Queue ActiveX clsid access
RuleID : 7446 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Mmedia.AsyncMHandler.1 ActiveX CLSID unicode access
RuleID : 7445 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Mmedia.AsyncMHandler.1 ActiveX clsid access
RuleID : 7444 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 mmAEPlugIn.AEPlugIn.1 ActiveX CLSID unicode access
RuleID : 7443 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer mmAEPlugIn.AEPlugIn.1 ActiveX clsid access
RuleID : 7442 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Frame Eater ActiveX CLSID unicode access
RuleID : 7438 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Frame Eater ActiveX clsid access
RuleID : 7437 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Dynamic Casts ActiveX function call
RuleID : 7436 - Revision : 16 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Dynamic Casts ActiveX clsid access
RuleID : 7435 - Revision : 19 - Type : BROWSER-PLUGINS
2014-01-10 DirectX Transform Wrapper Property Page ActiveX CLSID unicode access
RuleID : 7434 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer DirectX Transform Wrapper Property Page ActiveX c...
RuleID : 7433 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 DirectFrame.DirectControl.1 ActiveX CLSID unicode access
RuleID : 7432 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer DirectFrame.DirectControl.1 ActiveX clsid access
RuleID : 7431 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Bitmap ActiveX CLSID unicode access
RuleID : 7430 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Bitmap ActiveX clsid access
RuleID : 7429 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Allocator Fix ActiveX CLSID unicode access
RuleID : 7428 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer Allocator Fix ActiveX clsid access
RuleID : 7427 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 9x8Resize ActiveX CLSID unicode access
RuleID : 7426 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer 9x8Resize ActiveX clsid access
RuleID : 7425 - Revision : 14 - Type : BROWSER-PLUGINS
2016-04-05 Microsoft Internet Explorer long URL buffer overflow attempt
RuleID : 37961 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer long URL buffer overflow attempt
RuleID : 18517 - Revision : 6 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer frameset memory corruption attempt
RuleID : 18307 - Revision : 7 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer FTP command injection attempt
RuleID : 18300 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer cross domain information disclosure attempt
RuleID : 18194 - Revision : 7 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer cross domain information disclosure attempt
RuleID : 18193 - Revision : 8 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer long URL buffer overflow attempt
RuleID : 17494 - Revision : 10 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer cross domain information disclosure attempt
RuleID : 16045 - Revision : 10 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer compressed content attempt
RuleID : 16033 - Revision : 14 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2006-08-08 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms06-042.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:45:27
  • Multiple Updates
2014-01-19 21:30:00
  • Multiple Updates