Microsoft Internet Explorer (IE) fails to properly handle double-byte characters in URLs, which may allow a remote, unauthenticated attacker to execute arbitrary code.
IE fails to properly handle double-byte characters in URLs. When a specially crafted HTML file is opened in IE, system memory can be corrupted in a way that may allow an attacker to execute arbitrary code.
By convincing a user to access a specially crafted web page with IE, an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
This issue is addressed in Microsoft Security Bulletin MS06-013.
341028
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: April 11, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Microsoft Security Bulletin MS06-013.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23341028 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.microsoft.com/technet/security/Bulletin/MS06-013.mspx>
This vulnerability was disclosed by Microsoft, who in turn credit Sowhat of Nevis Labs with reporting the issue.
This document was written by Will Dormann.
CVE IDs: | CVE-2006-1189 |
---|---|
Severity Metric: | 32.40 Date Public: |