Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows daxctle.ocx and HTML parsing buffer overflows
updated since 13.09.2006
Published:15.11.2006
Source:
SecurityVulns ID:6614
Type:client
Threat Level:
9/10
Description:DirectAnimation.PathControl ActiveX control KeyFrame method heap overflow. Buffer overflow in CSS Floatproperty. May be used for hidden malware installation.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentZDI, [Full-disclosure] ZDI-06-041: Microsoft Internet Explorer CSS Float Property Memory Corruption Vulnerability (15.11.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-067 Cumulative Security Update for Internet Explorer (922760) (14.11.2006)
Files:Internet Explorer COM Object Heap Overflow Download Exec Exploit
 Microsoft Security Bulletin MS06-067 Cumulative Security Update for Internet Explorer (922760)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod