Microsoft Internet Explorer fails to properly handle embedded objects

ID VU:959649
Type cert
Reporter CERT
Modified 2006-04-11T00:00:00



Microsoft Internet Explorer (IE) does not properly handle embedded dynamic objects. This vulnerability may allow a remote attacker to execute arbitrary code.


IOleClientSite interface

According to Microsoft Security Bulletin MS06-013,

The IOleClientSite interface is the primary means by which an embedded object obtains information about the location and extent of its display site, its moniker, its user interface, and other resources provided by its container. For more information, see the product documentation_. _

The Problem

IE fails to properly handle embedded dynamic objects allowing a remote attacker to gain access to IOleClientSite information. An attacker may be able to leverage that information in a way that could allow them to bypass IE security settings.


More information is available in Microsoft Security Bulletin MS06-013.


By convincing a user to open a specially crafted web page, a remote unauthenticated attacker can execute arbitrary code on a vulnerable.


Apply an Update
This issue is addressed in Microsoft Security Bulletin MS06-013.

Refer to Microsoft Security Bulletin MS06-013 for workarounds for this vulnerability.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 11 Apr 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>


This vulnerability was reported in Microsoft Security Bulletin MS06-013 . Microsoft credits Heiko Schultze of SAP with providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-1190
  • Date Public: 11 Apr 2006
  • Date First Published: 11 Apr 2006
  • Date Last Updated: 11 Apr 2006
  • Severity Metric: 9.45
  • Document Revision: 12