Vulnerability Name: | CVE-2006-5162 (CCN-27900) | ||||||||
Assigned: | 2006-07-20 | ||||||||
Published: | 2006-07-20 | ||||||||
Updated: | 2021-12-13 | ||||||||
Summary: | wininet.dll in Microsoft Internet Explorer 6.0 SP2 and earlier allows remote attackers to cause a denial of service (unhandled exception and crash) via a long Content-Type header, which triggers a stack overflow. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 4.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:UR)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: BUGTRAQ Type: Broken Link 20060722 Microsoft Internet Explorer DOS Vulnerability Source: MITRE Type: CNA CVE-2006-5162 Source: SREASON Type: Exploit, Third Party Advisory 1683 Source: OSVDB Type: Broken Link 29129 Source: CCN Type: OSVDB ID: 29129 Microsoft IE wininet.dll Content-Type DoS Source: BID Type: Exploit, Third Party Advisory, VDB Entry 19092 Source: CCN Type: BID-19092 Microsoft Internet Explorer Content-Type Denial Of Service Vulnerability Source: VUPEN Type: Not Applicable ADV-2006-2917 Source: XF Type: Broken Link ie-wininet-dos(27900) Source: XF Type: UNKNOWN ie-wininet-dos(27900) Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 2039 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |