SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Microsoft Internet Explorer Vendors:   Microsoft
Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016839
SecurityTracker URL:  http://securitytracker.com/id/1016839
CVE Reference:   CVE-2006-3873   (Links to External Site)
Date:  Sep 13 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5 SP4, 6 SP1
Description:   A vulnerability was reported in Microsoft Internet Explorer (IE). A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted, compressed URL and return this URL from a web server as part of an HTTP 302 redirect message (via HTTP 1.1). This will trigger a heap overflow in URLMON.DLL and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vulnerability was introduced (or exposed) in the second MS06-042 patch for IE 5 SP4 and IE 6 SP1 [the second version of the patch was released on August 24, 2006].

IE 6 SP1 with MS06-042 v1 or v2 on Windows 2000, Windows XP SP1, or Windows Server 2003 is affected. IE 5 SP4 with MS06-042 on Windows 2000 is affected.

eEye Digital Security discovered this vulnerability.

The vendor was notified on August 24, 2006.

Impact:   A remote server can return a URL that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   On September 12, 2006, Microsoft re-issued the MS06-042 cumulative update for IE:

Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=44A8C303-B46C-4CCE-8442-D8A1CF1561DC&displaylang=en

Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 or on Microsoft Windows XP Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=B6E09C27-CE26-494F-AD2A-6C9A8C72453F&displaylang=en

Internet Explorer 6 for Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=CDB85BCA-0C17-44AA-B74E-F01B5392BB31

Internet Explorer 6 for Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D30209FA-9994-4F1B-B6D6-4BACC328135A&displaylang=en

Internet Explorer 6 for Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=FFE108B8-05C9-4B5E-A8A4-042F49068972

Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?familyid=5C2A23AC-3F2E-4BEC-BE16-4B45B44C6346

Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=0CE7F66D-4D83-4090-A034-9BBE286D96FA

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-042.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-042.mspx (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, SecurityGlobal.net LLC