exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 20595

Secunia Security Advisory 20595
Posted Jun 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to conduct phishing attacks and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 1d73727b5626f857c53ef84d412757fcf9602dfc2d71a53ff728a1738f976807

Secunia Security Advisory 20595

Change Mirror Download


----------------------------------------------------------------------

Want to join the Secunia Security Team?

Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.

http://secunia.com/secunia_security_specialist/

----------------------------------------------------------------------

TITLE:
Microsoft Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA20595

VERIFY ADVISORY:
http://secunia.com/advisories/20595/

CRITICAL:
Highly critical

IMPACT:
Spoofing, System access

WHERE:
>From remote

SOFTWARE:
Microsoft Internet Explorer 6.x
http://secunia.com/product/11/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
Some vulnerabilities have been reported in Internet Explorer, which
can be exploited by malicious people to conduct phishing attacks and
compromise a user's system.

1) A memory corruption error within the decoding of specially crafted
UTF-8 encoded HTML can be exploited to execute arbitrary code when a
user e.g. visits a malicious web site.

2) A memory corruption error within the
DXImageTransform.Microsoft.Light ActiveX control's parameter
validation can be exploited to execute arbitrary code when a user
e.g. visits a malicious web site.

3) An error within the way certain COM objects, which are not meant
to be instantiated in Internet Explorer, are instantiated can be
exploited to execute arbitrary code when e.g. a malicious web site is
visited.

4) An error allows spoofing of the information in the address bar and
other parts of the trust UI, which can be exploited to conduct
phishing attacks.

5) A memory corruption error in the way multipart HTML (.mht) is
saved can be exploited to execute arbitrary code if a user is tricked
into saving a specially crafted web page as multipart HTML.

SOLUTION:
Apply patches.

Internet Explorer 5.01 SP4 on Windows 2000 SP4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=91A997DE-BAE4-4AC7-912D-79EF8ABAEF4F

Internet Explorer 6 SP1 on Windows 2000 SP4 or Windows XP SP1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0EB17A41-FB43-413B-A5CC-41E1F3DEDE4F

Internet Explorer 6 for Windows XP SP2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=85CABE87-C4A0-4F80-BD1C-210E23FD8D81

Internet Explorer 6 for Windows Server 2003 and Windows Server 2003
SP1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=CCE7C875-C9A4-4C3D-A37B-946EE5E781E7

Internet Explorer 6 for Windows Server 2003 for Itanium-based systems
(with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=C8E4CFB6-1350-4AAE-B681-EE2ECAB41118

Internet Explorer 6 for Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1C7D5C6D-DDCF-485D-A1E3-60E55334FD74

Internet Explorer 6 for Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=F91791AC-8185-4346-AA66-89F74D4B5EA7

Internet Explorer 6 SP1 on Windows 98, Windows 98 SE, or Windows Me:
Patches are available from the Windows Update web site.

PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits TippingPoint and the Zero Day Initiative.
2) The vendor credits Will Dormann, CERT/CC.
3) The vendor credits TippingPoint and the Zero Day Initiative and HD
Moore of Metasploit Project.
4) The vendor credits Yorick Koster of ITsec Security Services and
hoshikuzu star_dust.
5) The vendor credits John Jones of DISC, State of Kansas.

ORIGINAL ADVISORY:
MS06-021 (KB916281):
http://www.microsoft.com/technet/security/Bulletin/MS06-021.mspx

OTHER REFERENCES:
KB article discussing known issues when installing the update:
http://support.microsoft.com/kb/916281

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close