Карточка уязвимости
Характеристики уязвимости
Уровень опасности
Оценка CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Производитель ПО
Наименование ПО
Microsoft Internet Explorer
(5.01, 6.0)
Microsoft Updates
(KB2412687, KB2544521, KB2659262, KB2797052, KB2817183, KB2829530, KB2834886, KB2838727, KB2846071, KB2862772, KB2870699, KB2879017, KB2888505, KB2898785, KB2909921, KB2919355, KB2925418, KB2936068, KB2957503, KB2957689, KB2962872, KB2963950, KB2963952, KB2976627, KB2977629, KB2987107, KB3003057, KB3008923, KB3021952, KB3032359, KB3038314, KB3049563, KB3058515, KB3065822, KB3078071, KB3087038, KB3087135, KB3093983, KB3097877, KB3100773, KB3104002, KB3109094, KB3124275, KB925486, KB929969, KB938127, KB938464, KB958869, SP0, SP1, SP2, SP3)
Описание
В реализации языка VML в системе Microsoft Windows существует уязвимость удаленного выполнения кода. Злоумышленник может воспользоваться данной уязвимостью, создав специальную веб-страницу или сообщение электронной почты в формате HTML, что делает потенциально возможным удаленный запуск кода при посещении пользователем этой веб-страницы или просмотре сообщения. Воспользовавшись этой уязвимостью, злоумышленник может захватить полный контроль над системой.
Как исправить
Используйте рекомендации производителя:
http://www.microsoft.com/technet/security/Bulletin/MS06-055.mspx
http://www.microsoft.com/technet/security/Bulletin/MS06-055.mspx
Ссылки
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html
CERT-VN (VU#416092): http://www.kb.cert.org/vuls/id/416092
BID (20096): http://www.securityfocus.com/bid/20096
FRSIRT (ADV-2006-3679): http://www.frsirt.com/english/advisories/2006/3679
XF (ie-vml-bo(29004)): http://xforce.iss.net/xforce/xfdb/29004
http://www.microsoft.com/technet/security/advisory/925568.mspx
SECTRACK (1016879): http://securitytracker.com/id?1016879
BUGTRAQ (20060919 Yet another 0day for IE): http://www.securityfocus.com/archive/1/archive/1/446378/100/0/threaded
BUGTRAQ (20060920 Internet Explorer VML Zero-Day Mitigation): http://www.securityfocus.com/archive/1/archive/1/446528/100/0/threaded
BUGTRAQ (20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit): http://www.securityfocus.com/archive/1/archive/1/446523/100/0/threaded
BUGTRAQ (20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit): http://www.securityfocus.com/archive/1/archive/1/446505/100/0/threaded
http://blogs.securiteam.com/index.php/archives/624
OSVDB (28946): http://www.osvdb.org/28946
MS (MS06-055): http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx
CERT (TA06-262A): http://www.us-cert.gov/cas/techalerts/TA06-262A.html
MSKB (925486): http://support.microsoft.com/kb/925486
BUGTRAQ (20060926 Windows VML security update MS06-055 released): http://www.securityfocus.com/archive/1/archive/1/447070/100/0/threaded
BUGTRAQ (20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written): http://www.securityfocus.com/archive/1/archive/1/446881/100/200/threaded
HP (HPSBST02160): http://www.securityfocus.com/archive/1/archive/1/448552/100/0/threaded
OVAL (oval:org.mitre.oval:def:100): http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:100
CERT-VN (VU#416092): http://www.kb.cert.org/vuls/id/416092
BID (20096): http://www.securityfocus.com/bid/20096
FRSIRT (ADV-2006-3679): http://www.frsirt.com/english/advisories/2006/3679
XF (ie-vml-bo(29004)): http://xforce.iss.net/xforce/xfdb/29004
http://www.microsoft.com/technet/security/advisory/925568.mspx
SECTRACK (1016879): http://securitytracker.com/id?1016879
BUGTRAQ (20060919 Yet another 0day for IE): http://www.securityfocus.com/archive/1/archive/1/446378/100/0/threaded
BUGTRAQ (20060920 Internet Explorer VML Zero-Day Mitigation): http://www.securityfocus.com/archive/1/archive/1/446528/100/0/threaded
BUGTRAQ (20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit): http://www.securityfocus.com/archive/1/archive/1/446523/100/0/threaded
BUGTRAQ (20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit): http://www.securityfocus.com/archive/1/archive/1/446505/100/0/threaded
http://blogs.securiteam.com/index.php/archives/624
OSVDB (28946): http://www.osvdb.org/28946
MS (MS06-055): http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx
CERT (TA06-262A): http://www.us-cert.gov/cas/techalerts/TA06-262A.html
MSKB (925486): http://support.microsoft.com/kb/925486
BUGTRAQ (20060926 Windows VML security update MS06-055 released): http://www.securityfocus.com/archive/1/archive/1/447070/100/0/threaded
BUGTRAQ (20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written): http://www.securityfocus.com/archive/1/archive/1/446881/100/200/threaded
HP (HPSBST02160): http://www.securityfocus.com/archive/1/archive/1/448552/100/0/threaded
OVAL (oval:org.mitre.oval:def:100): http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:100