First published: Tue Sep 12 2006(Updated: )
Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | =64-bit | |
Microsoft Windows 2003 Server | =itanium | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3873 has a severity rating that can lead to denial of service and the potential execution of arbitrary code.
To fix CVE-2006-3873, ensure that Microsoft Internet Explorer and affected Windows versions are updated with the latest security patches.
CVE-2006-3873 affects Microsoft Internet Explorer 6 SP1 and various versions of Windows, including Windows 2000, Windows XP, and Windows Server 2003.
CVE-2006-3873 is classified as a heap-based buffer overflow vulnerability.
CVE-2006-3873 can be exploited through specifically crafted GZIP-encoded URLs.