SB2006032301 - Multiple vulnerabilities in Microsoft Internet Explorer
Published: March 23, 2006 Updated: December 8, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Address bar spoofing (CVE-ID: CVE-2006-1192)
The vulnerability allows a remote user to perform spoofing attack.
The vulnerability exists due to an error, which allows an attacker to spoof address bar and other parts of web page.
Successful exploitation of this vulnerability may allow an attacker to perform spoofing attack and obtain potentially sensitive information or execute other malicious actions against victim.
2) Security restrictions bypass (CVE-ID: CVE-2006-1190)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to design error in the way Internet Explorer returns IOleClientSite information, when an embedded object is dynamically created. This issue allows a remote attacker to execute object in the wrong security context or security zone. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
3) Memory corruption (CVE-ID: CVE-2006-1189)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling double-byte characters in specially crafted URLs. A remote attacker can create a specially crafted URL, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
4) Memory corruption (CVE-ID: CVE-2006-1188)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling HTML elements with a specially crafted tag. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
5) Memory corruption (CVE-ID: CVE-2006-1186)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when initiating mdt2gddr.dll, mdt2dd.dll, and mdt2gddo.dll COM objects as ActiveX controls. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
6) Memory corruption (CVE-ID: CVE-2006-1185)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing certain invalid HTML code. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
7) Security restrictions bypass (CVE-ID: CVE-2006-1388)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to insecure initiation of HTML Application (HTA). A remote attacker can create a specially crafted .hta file, trick the victim into opening it, bypass implemented into IE security controls and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
8) Memory corruption (CVE-ID: CVE-2006-1245)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in mshtml.dll library when processing HTML tag with large number of script action handlers such as onload and onmouseover. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
9) Memory corruption (CVE-ID: CVE-2006-1359)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in createTextRange() DHTML method when handling unexpected user input for radio button control. A remote attacker can create a specially crafted web page, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.Note: this vulnerability is being actively exploited.
Remediation
Install update from vendor's website.