CERT-In Vulnerability Note
CIVN-2006-0127
Microsoft Internet Explorer Memory Corruption and TIF Folder Information Disclosure Vulnerabilites
Original Issue Date:December 13, 2006
Severity Rating: HIGH
Systems Affected
Microsoft Internet Explorer 5.01 Service Pack 4 on Windows 2000 Service Pack 4 Microsoft Internet Explorer 6 Service Pack 1 on Windows 2000 Service Pack 4 Microsoft Internet Explorer 6 for Windows XP Service Pack 2 Microsoft Internet Explorer 6 for Windows XP Professional x64 Edition Microsoft Internet Explorer 6 for Windows Server 2003 and Service Pack 1 Microsoft Internet Explorer 6 for Windows Server 2003 and SP1 for Itanium-based Systems
Overview
Four vulnerabilities have been reported in Microsoft Internet Explorer that could be exploited by an remote attackers to take complete control of the vulnerable system.
Description
1. Script Error Handling Memory Corruption Vulnerability
(
CVE-2006-5579
)
This vulnerability is caused due to a memory corruption error while processing a specially crafted argument. Internet Explorer attempts to access previously freed memory when handling script errors in certain situations. As a result, system memory may be corrupted in such a way that an attacker could execute arbitrary code.
2. DHTML Script Function Memory Corruption Vulnerability
(
CVE-2006-5581
)
This vulnerability is caused due to a memory corruption error when interpreting certain DHTML script function calls to incorrectly created elements, which could be exploited by attackers to compromise a vulnerable system by tricking a user into visiting a specially crafted web page.
3. TIF Folder Information Disclosure Vulnerability
(
CVE-2006-5578
)
This vulnerability is caused due to an error when handling certain drag and drop operations, which could be exploited by attackers to retrieve files from the Temporary Internet Files TIF folder on a vulnerable system. User interaction is required to exploit this vulnerability.
4. TIF Folder Information Disclosure Vulnerability
(
CVE-2006-5577
)
This vulnerability is caused due to an error when handling certain "OBJECT" tags, which could be exploited by attackers to cause a vulnerable application to disclose the path to the cached content in the TIF folder. User interaction is required to exploit this vulnerability.
Workaround
Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. Add sites that you trust to the Internet Explorer Trusted sites zone. Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones. Disable "Drag and Drop or copy and paste files" in Internet Explorer.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin MS06-072
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms06-072.mspx
Secunia
http://secunia.com/advisories/20807/
FrSIRT
http://www.frsirt.com/english/advisories/2006/3593
CVE Name
CVE-2006-5579
CVE-2006-5581
CVE-2006-5578
CVE-2006-5577
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|