CVE-2006-1313

Microsoft JScript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and 5.6 on Windows XP, Server 2003, Windows 98 and Windows Me, will "release objects early" in certain cases, which results in memory corruption and allows remote attackers to execute arbitrary code.
References
Link Resource
http://secunia.com/advisories/20620 Patch Vendor Advisory
http://securitytracker.com/id?1016283
http://www.kb.cert.org/vuls/id/390044 US Government Resource
http://www.osvdb.org/26434
http://www.securityfocus.com/bid/18359 Patch
http://www.us-cert.gov/cas/techalerts/TA06-164A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2321
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023
https://exchange.xforce.ibmcloud.com/vulnerabilities/26805
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1644
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1785
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2003
http://secunia.com/advisories/20620 Patch Vendor Advisory
http://securitytracker.com/id?1016283
http://www.kb.cert.org/vuls/id/390044 US Government Resource
http://www.osvdb.org/26434
http://www.securityfocus.com/bid/18359 Patch
http://www.us-cert.gov/cas/techalerts/TA06-164A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2321
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023
https://exchange.xforce.ibmcloud.com/vulnerabilities/26805
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1644
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1785
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2003
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:08

Type Values Removed Values Added
References () http://secunia.com/advisories/20620 - Patch, Vendor Advisory () http://secunia.com/advisories/20620 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1016283 - () http://securitytracker.com/id?1016283 -
References () http://www.kb.cert.org/vuls/id/390044 - US Government Resource () http://www.kb.cert.org/vuls/id/390044 - US Government Resource
References () http://www.osvdb.org/26434 - () http://www.osvdb.org/26434 -
References () http://www.securityfocus.com/bid/18359 - Patch () http://www.securityfocus.com/bid/18359 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-164A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-164A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/2321 - () http://www.vupen.com/english/advisories/2006/2321 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26805 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26805 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1067 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1067 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1644 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1644 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1785 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1785 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2003 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2003 -

Information

Published : 2006-06-13 19:06

Updated : 2024-11-21 00:08


NVD link : CVE-2006-1313

Mitre link : CVE-2006-1313

CVE.ORG link : CVE-2006-1313


JSON object : View

Products Affected

microsoft

  • windows_98
  • windows_xp
  • windows_me
  • windows_2000
  • windows_98se
  • windows_2003_server