Vulnerability Name: | CVE-2006-3451 (CCN-28037) | ||||||||
Assigned: | 2006-08-08 | ||||||||
Published: | 2006-08-08 | ||||||||
Updated: | 2018-10-18 | ||||||||
Summary: | Microsoft Internet Explorer 5 SP4 and 6 do not properly garbage collect when "multiple imports are used on a styleSheets collection" to construct a chain of Cascading Style Sheets (CSS), which allows remote attackers to execute arbitrary code via unspecified vectors. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-3451 Source: CCN Type: SA21396 Internet Explorer Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 21396 Source: SREASON Type: UNKNOWN 1343 Source: CCN Type: SECTRACK ID: 1016663 Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1016663 Source: CCN Type: ASA-2006-154 Windows Security Updates for August 2006 - (MS06-040 - MS06-051) Source: CCN Type: US-CERT VU#262004 Microsoft Internet Explorer fails to properly handle chained Cascading Style Sheets Source: CERT-VN Type: Patch, US Government Resource VU#262004 Source: CCN Type: Microsoft Security Bulletin MS06-042 Cumulative Security Update for Internet Explorer (918899) Source: CCN Type: Microsoft Security Bulletin MS06-067 Cumulative Security Update for Internet Explorer (922760) Source: CCN Type: Microsoft Security Bulletin MS06-072 Cumulative Security Update for Internet Explorer (925454) Source: CCN Type: Microsoft Security Bulletin MS07-016 Cumulative Security Update for Internet Explorer (928090) Source: CCN Type: Microsoft Security Bulletin MS07-027 Cumulative Security Update for Internet Explorer (931768) Source: CCN Type: Microsoft Security Bulletin MS07-033 Cumulative Security Update for Internet Explorer (933566) Source: CCN Type: Microsoft Security Bulletin MS07-045 Cumulative Security Update for Internet Explorer (937143) Source: CCN Type: Microsoft Security Bulletin MS07-057 Cumulative Security Update for Internet Explorer (939653) Source: CCN Type: Microsoft Security Bulletin MS07-069 Cumulative Security Update for Internet Explorer (942615) Source: CCN Type: Microsoft Security Bulletin MS08-010 Cumulative Security Update for Internet Explorer (944533) Source: CCN Type: Microsoft Security Bulletin MS08-024 Cumulative Security Update for Internet Explorer (947864) Source: CCN Type: Microsoft Security Bulletin MS08-031 Cumulative Security Update for Internet Explorer (950759) Source: CCN Type: Microsoft Security Bulletin MS08-045 Cumulative Security Update for Internet Explorer (953838) Source: CCN Type: Microsoft Security Bulletin MS08-058 Cumulative Security Update for Internet Explorer (956390) Source: OSVDB Type: UNKNOWN 27854 Source: CCN Type: OSVDB ID: 27854 Microsoft IE Chained CSS Imports Memory Corruption Source: BUGTRAQ Type: UNKNOWN 20060808 ZDI-06-026: Microsoft Internet Explorer Multiple CSS Imports Memory Corruption Vulnerability Source: BID Type: UNKNOWN 19316 Source: CCN Type: BID-19316 Microsoft Internet Explorer Chained Cascading Style Sheets Remote Code Execution Vulnerability Source: CCN Type: US-CERT Technical Cyber Security Alert TA06-220A Microsoft Windows, Office, and Internet Explorer Vulnerabilities Source: CERT Type: Patch, US Government Resource TA06-220A Source: VUPEN Type: Vendor Advisory ADV-2006-3212 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-06-026.html Source: MS Type: UNKNOWN MS06-042 Source: XF Type: UNKNOWN ie-chained-css-code-execution(28037) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:5 Source: CCN Type: ZDI-06-026 Microsoft Internet Explorer Multiple CSS Imports Memory Corruption Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |