First published: Thu Sep 14 2006(Updated: )
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4777 has a critical severity rating due to its potential to allow remote code execution.
To fix CVE-2006-4777, users should upgrade to a non-vulnerable version of Internet Explorer or apply the necessary security patches provided by Microsoft.
CVE-2006-4777 specifically affects Microsoft Internet Explorer 6.0 SP1 on certain Windows distributions.
Yes, CVE-2006-4777 can be exploited remotely, allowing attackers to execute arbitrary code without user interaction.
While the best mitigation for CVE-2006-4777 is to upgrade software, disabling Active Scripting in Internet Explorer may offer a temporary workaround.