CWE
NVD-CWE-Other 476
Advisory Published
Updated

CVE-2006-3513: Null Pointer Dereference

First published: Tue Jul 11 2006(Updated: )

danim.dll in Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (application crash) by accessing the Data property of a DirectAnimation DAUserData object before it is initialized, which triggers a NULL pointer dereference.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Microsoft Internet Explorer=6.0
Microsoft Internet Explorer=6.0-sp1
Microsoft Internet Explorer=6.0-sp2
Microsoft Internet Explorer=6.0-windows_xp_sp2
Internet Explorer=6.0
Internet Explorer=6.0.2600
Internet Explorer=6.0.2800
Internet Explorer=6.0.2800.1106
Internet Explorer=6.0.2900.2180

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-3513?

    CVE-2006-3513 has a severity rating that indicates it allows remote attackers to cause a denial of service through application crash.

  • How do I fix CVE-2006-3513?

    To mitigate CVE-2006-3513, you should upgrade to a version of Internet Explorer that does not have this vulnerability.

  • Which versions of Internet Explorer are affected by CVE-2006-3513?

    CVE-2006-3513 affects Microsoft Internet Explorer 6.0 and its service packs.

  • What type of vulnerability is CVE-2006-3513?

    CVE-2006-3513 is a denial of service vulnerability caused by a NULL pointer dereference.

  • What can attackers achieve with CVE-2006-3513?

    Attackers can use CVE-2006-3513 to crash the Internet Explorer application, leading to denial of service.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203