Microsoft Internet Explorer (IE) does not properly handle embedded dynamic objects. This vulnerability may allow a remote attacker to execute arbitrary code.
According to Microsoft Security Bulletin MS06-013,
The IOleClientSite interface is the primary means by which an embedded object obtains information about the location and extent of its display site, its moniker, its user interface, and other resources provided by its container. For more information, see the product documentation_. _
IE fails to properly handle embedded dynamic objects allowing a remote attacker to gain access to IOleClientSite information. An attacker may be able to leverage that information in a way that could allow them to bypass IE security settings.
More information is available in Microsoft Security Bulletin MS06-013.
By convincing a user to open a specially crafted web page, a remote unauthenticated attacker can execute arbitrary code on a vulnerable.
Apply an Update
This issue is addressed in Microsoft Security Bulletin MS06-013.
Refer to Microsoft Security Bulletin MS06-013 for workarounds for this vulnerability.
Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 11 Apr 2006
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This vulnerability was reported in Microsoft Security Bulletin MS06-013 . Microsoft credits Heiko Schultze of SAP with providing information regarding this vulnerability.
This document was written by Jeff Gennari.