Overview
Microsoft Internet Explorer is vulnerable to a buffer overflow when processing a long URL on a web site that uses HTTP 1.1 compression. This could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft Internet Explorer 6 Service Pack 1 on Windows 2000 and Windows XP SP1 contains a vulnerability when viewing a web site using the HTTP 1.1 protocol. If the web site uses HTTP 1.1 compression and contains an overly long URL, a buffer overflow can occur. Note that this vulnerability was introduced with the first release of the MS06-042 updates on August 8, 2006. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser ActiveX control) to crash. |
Solution
Apply an update |
Disable Active Scripting
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/advisory/923762.mspx
- http://www.microsoft.com/technet/security/Bulletin/MS06-042.mspx
- http://support.microsoft.com/?kbid=918899
- http://www.w3.org/Protocols/rfc2616/rfc2616.html
- http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.5
- http://research.eeye.com/html/alerts/AL20060822.html
- http://www.securityfocus.com/bid/19667
Acknowledgements
Thanks to Dejan Kovacevic of Bold Internet Solutions for reporting this vulnerability.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2006-3869 |
Severity Metric: | 13.37 |
Date Public: | 2006-08-22 |
Date First Published: | 2006-08-22 |
Date Last Updated: | 2006-08-24 18:12 UTC |
Document Revision: | 13 |