Check Point Advisories

Update Protection against Microsoft Internet Explorer DirectAnimation Path (daxctle.ocx) Vulnerabilities (MS06-067)

Check Point Reference: CPAI-2006-118
Date Published: 11 Oct 2006
Severity: High
Last Updated: Thursday 03 May, 2007
Source: Microsoft Security Bulletin MS06-067
Industry Reference:CVE-2006-4777
CVE-2006-4446
US-CERT VU#377369
Protection Provided by:
Who is Vulnerable? Microsoft Internet Explorer 5.01 SP4 on Microsoft Windows 2000 SP4
Microsoft Internet Explorer 6 SP1 on Microsoft Windows 2000 SP4
Microsoft Internet Explorer 6 SP1 on Microsoft Windows XP SP1
Microsoft Internet Explorer 6 for Microsoft Windows XP SP2
Microsoft Internet Explorer 6 for Microsoft Windows Server 2003
Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 SP1
Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 (Itanium)
Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 with SP1 (Itanium)
Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition
Microsoft Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition
Microsoft Internet Explorer 6 SP1 on Microsoft Windows 98
Microsoft Internet Explorer 6 SP1 on Microsoft Windows 98 SE
Microsoft Internet Explorer 6 SP1 on Microsoft Windows Millennium Edition
Vulnerability Description Microsoft Internet Explorer (IE) contains heap overflow vulnerabilities. The vulnerabilities exist in Microsoft DirectAnimation Path ActiveX Control (DirectAnimation.PathControl) that is included in the COM object daxctle.ocx. DirectAnimation is a component of the DirectX family of APIs that provide animation and media support for Web pages and multimedia applications. By convincing a user to visit a specially crafted Web page, a remote attacker may trigger these vulnerabilities to deny service from legitimate users (by causing the victim's Web browser to crash) and could possibly execute arbitrary code on affected systems.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS06-067
Vulnerability DetailsThese vulnerabilities are caused due to a memory corruption error in the daxctle.ocx COM object.

CVE-2006-4446: The vulnerability occurs when the DirectAnimation PathControl COM object is instantiated as an ActiveX control with an invalid Spline method.

CVE-2006-4777: The vulnerability occurs when processing a specially crafted argument passed to the "KeyFrame()" method of a daxctle.ocx COM object.

An attacker can trigger these flaws by convincing a user to view a specially crafted HTML document. Successful exploitation could result in the crashing of the victim's Web browser, once the malicious page is loaded and possibly allows execution of arbitrary code.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK