Microsoft JScript contains a memory corruption vulnerability. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
According to Microsoft Security Bulletin MS06-023:
JScript is the Microsoft implementation of the ECMA 262 language specification (ECMAScript Edition 3). JScript is an interpreted, object-based scripting language. For more information see the product documentation.
Microsoft JScript fails to properly release objects allowing in a memory corruption vulnerability to occur. When a specially crafted JScript file, or specially crafted web page containing JScript is accessed, system memory can be corrupted in a way that could allow a remote attacker to execute arbitrary code.
For more information refer to Microsoft Security Bulletin MS06-023
A remote, unauthenticated attacker may be able to execute arbitrary code. If the attacked user is running with administrative privileges, the attacker could take complete control of an affected system.
Apply a patch from Microsoft
Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-023.
Disable Active Scripting
For instructions on how to disable Active Scripting in Microsoft Internet Explorer, please refer to the Internet Explorer section of the Securing Your Web Browser document.
A complete list of workarounds is available in Microsoft Security Bulletin MS06-023.
Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 13 Jun 2006
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This vulnerability was reported in Microsoft Security Bulletin MS06-023 .
This document was written by Jeff Gennari.