CVE-2006-4777
Microsoft Internet Explorer - COM Object Remote Heap Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
Desbordamiento de búfer basado en montón en el DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) para el Internet Explorer 6.0 SP1 en chino y posiblemente en otras distribuciones de, permite a un atacante remoto ejecutar código de su elección a través de manipulaciones desconocidas en los argumentos del método KeyFrame, relacionado posiblemente con un desbordamiento del número entero, según lo demostrado por daxctle2, y una vulnerabilidad diferente a la CVE-2006-4446.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-09-13 CVE Reserved
- 2006-09-13 First Exploit
- 2006-09-14 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (21)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/2358 | 2006-09-13 | |
https://www.exploit-db.com/exploits/16506 | 2010-07-16 | |
https://github.com/Mario1234/js-driveby-download-CVE-2006-4777 | 2018-02-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/21910 | 2018-10-17 | |
http://www.vupen.com/english/advisories/2006/3593 | 2018-10-17 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 | 2018-10-17 |