CVE-2006-5579

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."
References
Link Resource
http://secunia.com/advisories/20807
http://secunia.com/secunia_research/2006-58/advisory/ Vendor Advisory
http://securitytracker.com/id?1017373
http://www.kb.cert.org/vuls/id/599832 US Government Resource
http://www.osvdb.org/30813
http://www.securityfocus.com/archive/1/454205/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/21552
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4966 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A761
http://secunia.com/advisories/20807
http://secunia.com/secunia_research/2006-58/advisory/ Vendor Advisory
http://securitytracker.com/id?1017373
http://www.kb.cert.org/vuls/id/599832 US Government Resource
http://www.osvdb.org/30813
http://www.securityfocus.com/archive/1/454205/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/21552
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4966 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A761
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () http://secunia.com/advisories/20807 - () http://secunia.com/advisories/20807 -
References () http://secunia.com/secunia_research/2006-58/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2006-58/advisory/ - Vendor Advisory
References () http://securitytracker.com/id?1017373 - () http://securitytracker.com/id?1017373 -
References () http://www.kb.cert.org/vuls/id/599832 - US Government Resource () http://www.kb.cert.org/vuls/id/599832 - US Government Resource
References () http://www.osvdb.org/30813 - () http://www.osvdb.org/30813 -
References () http://www.securityfocus.com/archive/1/454205/100/0/threaded - () http://www.securityfocus.com/archive/1/454205/100/0/threaded -
References () http://www.securityfocus.com/archive/1/454969/100/200/threaded - () http://www.securityfocus.com/archive/1/454969/100/200/threaded -
References () http://www.securityfocus.com/bid/21552 - () http://www.securityfocus.com/bid/21552 -
References () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/4966 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4966 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A761 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A761 -

Information

Published : 2006-12-12 20:28

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5579

Mitre link : CVE-2006-5579

CVE.ORG link : CVE-2006-5579


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • internet_explorer
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer