CVE Reference: CVE-2006-4777

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2006-4777

Description:
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/28942

ST
  1016854

SREASON
  http://securityreason.com/securityalert/1577

SAID
  Secunia Advisory: SA21910

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1103

OSVDB
  28842

MS
  http://www.microsoft.com/technet/security/bulletin/ms06-067.mspx

MISC
  http://www.xsec.org/index.php?module=releases&act=view&type=2&id=20

MILW0RM
  http://milw0rm.com/exploits/2358

CONFIRM
  http://www.microsoft.com/technet/security/advisory/925444.mspx

CERT-VN
  377369

CERT
  http://www.us-cert.gov/cas/techalerts/TA06-318A.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/446246/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/446085/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/446065/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/446084/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/445898/100/0/threaded

BID
  20047


Return to the previous page.