SB2006032301 - Multiple vulnerabilities in Microsoft Internet Explorer



SB2006032301 - Multiple vulnerabilities in Microsoft Internet Explorer

Published: March 23, 2006 Updated: December 8, 2016

Security Bulletin ID SB2006032301
Severity
Critical
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 11% High 78% Low 11%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Address bar spoofing (CVE-ID: CVE-2006-1192)

The vulnerability allows a remote user to perform spoofing attack.

The vulnerability exists due to an error, which allows an attacker to spoof address bar and other parts of web page.

Successful exploitation of this vulnerability may allow an attacker to perform spoofing attack and obtain potentially sensitive information or execute other malicious actions against victim.


2) Security restrictions bypass (CVE-ID: CVE-2006-1190)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to design error in the way Internet Explorer returns IOleClientSite information, when an embedded object is dynamically created. This issue allows a remote attacker to execute object in the wrong security context or security zone. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



3) Memory corruption (CVE-ID: CVE-2006-1189)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling double-byte characters in specially crafted URLs. A remote attacker can create a specially crafted URL, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



4) Memory corruption (CVE-ID: CVE-2006-1188)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling HTML elements with a specially crafted tag. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



5) Memory corruption (CVE-ID: CVE-2006-1186)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when initiating mdt2gddr.dll,  mdt2dd.dll, and mdt2gddo.dll COM objects as ActiveX controls. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



6) Memory corruption (CVE-ID: CVE-2006-1185)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing certain invalid HTML code. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



7) Security restrictions bypass (CVE-ID: CVE-2006-1388)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure initiation of HTML Application (HTA). A remote attacker can create a specially crafted .hta file, trick the victim into opening it, bypass implemented into IE security controls and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



8) Memory corruption (CVE-ID: CVE-2006-1245)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in mshtml.dll library when processing HTML tag with large number of script action handlers such as onload and onmouseover. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



9) Memory corruption (CVE-ID: CVE-2006-1359)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in createTextRange() DHTML method when handling unexpected user input for radio button control. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability is being actively exploited.


Remediation

Install update from vendor's website.