|
|
|
|
| |
Credit:
The information has been provided by ZDI.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-06-018.html
The vendor advisory can be found at: http://www.securiteam.com/windowsntfocus/5OP0C15IUS.html
|
| |
Vulnerable Systems:
* Internet Explorer 6 All Versions
* Internet Explorer 5 SP4
The specific flaw exists in the Microsoft ActiveX object DXImageTransform.Microsoft.MMSpecialEffect1Input.
Due to improper garbage collection when another object is assigned to any property, code execution is possible. This object implements the IobjectSafety interface and thus the default Internet Explorer settings allow for arbitrary code execution without any further user interaction.
Several related ActiveX objects suffer from the same problem including:
* DXImageTransform.Microsoft.MMSpecialEffect1Input.1
* DXImageTransform.Microsoft.MMSpecialEffect2Inputs
* DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1
* DXImageTransform.Microsoft.MMSpecialEffectInplace1Input
* DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Successful exploitation requires that the target user browse to a malicious web page.
CVE Information:
CVE-2006-2383
Vendor Status:
Microsoft has issued an update to correct this vulnerability. More details can be found at: http://www.microsoft.com/technet/security/bulletin/MS06-021.mspx.
Disclosure Timeline:
2006.04.27 Vulnerability reported to vendor
2006.06.13 Digital Vaccine released to TippingPoint customers
2006.06.13 Coordinated public release of advisory
|
|
|
|
|