CVE-2006-3450
Microsoft Internet Explorer CSS Class Ordering Memory Corruption Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file.
Microsoft Internet Explorer 6 permite a atacantes remotos ejecutar código de su elección usando la función Javascript document.getElementByID para acceder a elementos de Hojas de Estilo en Cascada (CSS) manipulados, y posiblemente otros vectores no especificados relacionados con determinadas combinaciones de posicionamiento en el diseño de un archivo HTML.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
The specific vulnerability exists due to improper handling of CSS class values. Accessing a specially crafted CSS element via document.getElementByID causes a memory corruption eventually leading to code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-07-07 CVE Reserved
- 2006-08-08 CVE Published
- 2023-10-04 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1016663 | Vdb Entry | |
http://www.osvdb.org/27855 | Vdb Entry | |
http://www.securityfocus.com/archive/1/442579/100/0/threaded | Mailing List | |
http://www.zerodayinitiative.com/advisories/ZDI-06-027.html | X_refsource_misc | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A433 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.kb.cert.org/vuls/id/119180 | 2021-07-23 | |
http://www.securityfocus.com/bid/19312 | 2021-07-23 | |
http://www.us-cert.gov/cas/techalerts/TA06-220A.html | 2021-07-23 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/21396 | 2021-07-23 | |
http://www.vupen.com/english/advisories/2006/3212 | 2021-07-23 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 | 2021-07-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Ie Search vendor "Microsoft" for product "Ie" | 6.0 Search vendor "Microsoft" for product "Ie" and version "6.0" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Internet Explorer Search vendor "Microsoft" for product "Internet Explorer" | 6.0 Search vendor "Microsoft" for product "Internet Explorer" and version "6.0" | - |
Affected
|