Vulnerabilities > CVE-2006-4446 - Buffer Overflow vulnerability in Microsoft IE 6.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Heap-based buffer overflow in DirectAnimation.PathControl COM object (daxctle.ocx) in Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Spline function call whose first argument specifies a large number of points.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Microsoft Internet Explorer 5.0.1 Daxctle.OCX Spline Method Heap Buffer Overflow Vulnerability. CVE-2006-4446. Remote exploit for windows platform |
id | EDB-ID:28438 |
last seen | 2016-02-03 |
modified | 2006-08-28 |
published | 2006-08-28 |
reporter | XSec |
source | https://www.exploit-db.com/download/28438/ |
title | Microsoft Internet Explorer 5.0.1 Daxctle.OCX Spline Method Heap Buffer Overflow Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-067.NASL |
description | The remote host is missing the IE cumulative security update 922760. The remote version of IE is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host. Note that Microsoft has re-released this hotfix as its initial version contained a buffer overflow. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23644 |
published | 2006-11-14 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23644 |
title | MS06-067: Cumulative Security Update for Internet Explorer (922760) |
code |
|
Oval
accepted | 2007-02-20T13:40:33.869-05:00 | ||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||
description | Heap-based buffer overflow in DirectAnimation.PathControl COM object (daxctle.ocx) in Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Spline function call whose first argument specifies a large number of points. | ||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:437 | ||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||
submitted | 2006-11-15T12:28:05 | ||||||||||||||||||||||||||||||||||||||||||||
title | DirectAnimation ActiveX Controls Memory Corruption Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||
version | 70 |
References
- http://secunia.com/advisories/21910
- http://securityreason.com/securityalert/1468
- http://securitytracker.com/id?1016764
- http://www.osvdb.org/28841
- http://www.securityfocus.com/archive/1/444504/100/0/threaded
- http://www.securityfocus.com/bid/19738
- http://www.us-cert.gov/cas/techalerts/TA06-318A.html
- http://www.xsec.org/index.php?module=releases&act=view&type=1&id=19
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28608
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A437