First published: Tue Apr 11 2006(Updated: )
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.01 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.1 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1189 is classified as a critical vulnerability due to its potential to allow remote code execution.
Mitigation for CVE-2006-1189 involves upgrading to a non-vulnerable version of Internet Explorer or applying security patches provided by Microsoft.
CVE-2006-1189 affects Internet Explorer versions 5.01, 5.5, 5.1, and 6.0.
CVE-2006-1189 can be exploited through crafted URLs that utilize International Domain Names with double-byte character sets.
Exploitation of CVE-2006-1189 can lead to arbitrary code execution, allowing an attacker to take control of the affected system.