CVE-2006-2218
CVSS9.3
发布时间 :2006-05-05 08:46:00
修订时间 :2011-10-11 00:00:00
NMCS    

[原文]Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992.


[CNNVD]Microsoft Internet Explorer OBJECT标签 内存破坏漏洞(CNNVD-200605-108)

        Microsoft Internet Explorer是微软发布的非常流行的WEB浏览器。
        IE在处理某些异常情况时存在内存破坏漏洞。如果用户受骗访问了恶意的站点的话,IE就会允许对象注册可能无法正确处理某些情况的异常处理器,通过特别序列的嵌套"object" HTML标签触发内存破坏,导致执行任意代码。

- CVSS (基础分值)

CVSS分值: 9.3 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1961Exception Handling Memory Corruption Vulnerability(64-bit XP)
oval:org.mitre.oval:def:1845Exception Handling Memory Corruption Vulnerability (Win2k)
oval:org.mitre.oval:def:1768Exception Handling Memory Corruption Vulnerability (XP,SP2)
oval:org.mitre.oval:def:1765Exception Handling Memory Corruption Vulnerability (2K/XP)
oval:org.mitre.oval:def:1728Exception Handling Memory Corruption Vulnerability (WinS03)
oval:org.mitre.oval:def:1078Exception Handling Memory Corruption Vulnerability (S03,SP1)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2218
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2218
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-108
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-164A.html
(UNKNOWN)  CERT  TA06-164A
http://www.kb.cert.org/vuls/id/338828
(UNKNOWN)  CERT-VN  VU#338828
http://www.microsoft.com/technet/security/bulletin/ms06-021.mspx
(PATCH)  MS  MS06-021
http://secunia.com/advisories/19762
(VENDOR_ADVISORY)  SECUNIA  19762
http://www.vupen.com/english/advisories/2006/2319
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2319
http://www.securityfocus.com/bid/17820
(UNKNOWN)  BID  17820
http://www.securityfocus.com/archive/1/archive/1/437099/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060614 Secunia Resaerch: Internet Explorer Exception Handling Memory Corruption Vulnerability
http://www.osvdb.org/27475
(UNKNOWN)  OSVDB  27475
http://securitytracker.com/id?1016291
(UNKNOWN)  SECTRACK  1016291
http://secunia.com/secunia_research/2006-41/advisory
(VENDOR_ADVISORY)  MISC  http://secunia.com/secunia_research/2006-41/advisory

- 漏洞信息

Microsoft Internet Explorer OBJECT标签 内存破坏漏洞
高危 资料不足
2006-05-05 00:00:00 2006-06-20 00:00:00
远程  
        Microsoft Internet Explorer是微软发布的非常流行的WEB浏览器。
        IE在处理某些异常情况时存在内存破坏漏洞。如果用户受骗访问了恶意的站点的话,IE就会允许对象注册可能无法正确处理某些情况的异常处理器,通过特别序列的嵌套"object" HTML标签触发内存破坏,导致执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-021.mspx

- 漏洞信息

Microsoft Internet Explorer Unspecified OBJECT Tag Memory Corruption Variant Vulnerability
Unknown 17820
Yes No
2006-05-03 12:00:00 2006-06-14 06:46:00
Andreas Sandblad is credited with the discovery of this vulnerability.

- 受影响的程序版本

Microsoft Internet Explorer 5.0.1 SP4
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows 2000 Server SP4
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional

- 漏洞讨论

Microsoft Internet Explorer is prone to an unspecified memory-corruption vulnerability.

An attacker could exploit this issue via a malicious web page to potentially execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely crash the affected application.

This issue is reportedly a variant of BID 17658 (Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption Vulnerability). Further details are currently unavailable. This BID will be updated as more information is disclosed.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Microsoft has released patches to address this and other vulnerabilities in Internet Explorer:


Microsoft Internet Explorer 6.0 SP1

Microsoft Internet Explorer 6.0

Microsoft Internet Explorer 5.0.1 SP4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站