ID CVE-2006-1188
Summary Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:ie:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.1:*:mac_os:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.1:*:mac_os:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.2.3:*:macintosh:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.2.3:*:macintosh:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.5:preview:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.5:preview:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.5:sp1:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.5:sp1:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:*:windows_xp_professional_64bit:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:*:windows_xp_professional_64bit:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:sp1:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:sp1:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:sp1:windows_xpsp1:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:sp1:windows_xpsp1:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:windows_2000_sp4:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:windows_2000_sp4:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1_itanium_systems:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1_itanium_systems:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6:windows_xp_sp2:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6:windows_xp_sp2:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0.2600:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2600:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0.2800:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2800:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0.2800.1106:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2800.1106:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:ie:6.0.2900.2180:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:ie:6.0.2900.2180:*:*:*:*:*:*:*
  • cpe:2.3:h:canon:network_camera_server_vb101:*:*:*:*:*:*:*:*
    cpe:2.3:h:canon:network_camera_server_vb101:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2011-05-16T04:00:24.709-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
    family windows
    id oval:org.mitre.oval:def:1144
    status accepted
    submitted 2006-04-12T12:55:00.000-04:00
    title IE6 HTML Tag Memory Corruption (Server 2003,SP1)
    version 68
  • accepted 2014-02-24T04:00:12.850-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Matthew Wojcik
      organization The MITRE Corporation
    • name Preeti Subramanian
      organization SecPod Technologies
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
    family windows
    id oval:org.mitre.oval:def:1290
    status accepted
    submitted 2006-04-12T12:55:00.000-04:00
    title IE6 HTML Tag Memory Corruption (Win2K/WinXP)
    version 73
  • accepted 2011-05-16T04:00:48.592-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
    family windows
    id oval:org.mitre.oval:def:1296
    status accepted
    submitted 2006-04-12T12:55:00.000-04:00
    title IE6 HTML Tag Memory Corruption (Server 2003)
    version 68
  • accepted 2011-05-16T04:01:47.114-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Dragos Prisaca
      organization Gideon Technologies, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
    family windows
    id oval:org.mitre.oval:def:1773
    status accepted
    submitted 2006-04-12T12:55:00.000-04:00
    title IE6 HTML Tag Memory Corruption (WinXP)
    version 69
refmap via4
bugtraq 20060525 [BuHa-Security] MS06-013: HTML Tag Memory Corruption Vulnerability in MS IE 6 SP2
cert TA06-101A
cert-vn VU#824324
sectrack 1015900
secunia 18957
vupen ADV-2006-1318
Last major update 18-10-2018 - 16:31
Published 11-04-2006 - 23:02
Last modified 18-10-2018 - 16:31
Back to Top