Check Point Reference: | CPAI-2006-118 |
Date Published: | 11 Oct 2006 |
Severity: | High |
Last Updated: | Thursday 03 May, 2007 |
Source: | Microsoft Security Bulletin MS06-067 |
Industry Reference: | CVE-2006-4777 CVE-2006-4446 US-CERT VU#377369 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Internet Explorer 5.01 SP4 on Microsoft Windows 2000 SP4 Microsoft Internet Explorer 6 SP1 on Microsoft Windows 2000 SP4 Microsoft Internet Explorer 6 SP1 on Microsoft Windows XP SP1 Microsoft Internet Explorer 6 for Microsoft Windows XP SP2 Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 SP1 Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 (Itanium) Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 with SP1 (Itanium) Microsoft Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition Microsoft Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition Microsoft Internet Explorer 6 SP1 on Microsoft Windows 98 Microsoft Internet Explorer 6 SP1 on Microsoft Windows 98 SE Microsoft Internet Explorer 6 SP1 on Microsoft Windows Millennium Edition |
Vulnerability Description | Microsoft Internet Explorer (IE) contains heap overflow vulnerabilities. The vulnerabilities exist in Microsoft DirectAnimation Path ActiveX Control (DirectAnimation.PathControl) that is included in the COM object daxctle.ocx. DirectAnimation is a component of the DirectX family of APIs that provide animation and media support for Web pages and multimedia applications. By convincing a user to visit a specially crafted Web page, a remote attacker may trigger these vulnerabilities to deny service from legitimate users (by causing the victim's Web browser to crash) and could possibly execute arbitrary code on affected systems. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS06-067 |
Vulnerability Details | These vulnerabilities are caused due to a memory corruption error in the daxctle.ocx COM object. CVE-2006-4446: The vulnerability occurs when the DirectAnimation PathControl COM object is instantiated as an ActiveX control with an invalid Spline method. CVE-2006-4777: The vulnerability occurs when processing a specially crafted argument passed to the "KeyFrame()" method of a daxctle.ocx COM object. An attacker can trigger these flaws by convincing a user to view a specially crafted HTML document. Successful exploitation could result in the crashing of the victim's Web browser, once the malicious page is loaded and possibly allows execution of arbitrary code. |