Check Point Advisories

Update Protection against Microsoft Windows MHTML Remote Code Execution Vulnerability (MS06-043)

Check Point Reference: CPAI-2006-113
Date Published: 11 Oct 2006
Severity: High
Last Updated: Thursday 03 May, 2007
Source: Microsoft Security Bulletin MS06-043
Industry Reference:CVE-2006-2766
US-CERT VU#891204
Protection Provided by:
Who is Vulnerable? Microsoft Windows XP SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 SP1 (Itanium)
Microsoft Windows Server 2003 x64 Edition
Microsoft Outlook Express 6 on Microsoft Windows XP SP2
Microsoft Outlook Express 6 on Microsoft Windows XP Professional x64 Edition
Microsoft Outlook Express 6 on Microsoft Windows Server 2003 SP1
Microsoft Outlook Express 6 on Microsoft Windows Server 2003 SP1 (Itanium)
Microsoft Outlook Express 6 on Microsoft Windows Server 2003 x64 Edition
Vulnerability Description Several Microsoft Windows applications are prone to a buffer overflow vulnerability. Microsoft Internet Explorer, Windows Explorer and Outlook Express 6 fail to properly process overly long MHTML URLs. MHTML is an Internet standard that defines the MIME structure used to send HTML content in e-mail message bodies. It also extends HTML to embed encoded objects in the HTML document. A remote attacker can exploit this vulnerability to crash the affected application or to execute arbitrary commands.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS06-043
Vulnerability DetailsThis vulnerability is due to a flaw in the Microsoft Internet Messaging library "inetcomm.dll". By convincing a user to enter a specially crafted web page or open a malicious e-mail message or HTML file, an attacker can execute arbitrary commands or cause the application to crash.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK