9.3
CVSSv2

CVE-2006-1359

Published: 23/03/2006 Updated: 23/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 955
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Internet Explorer 6 and 7 Beta 2 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 6.0

microsoft ie 6.0

microsoft ie 7.0

Exploits

## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic) The latest # version of the Framework can always be obtained from metasp ...
<!-- -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ /\ \/ Internet Explorer Remote Code Execution Exploit v 01 /\ by Darkeagle of Unl0ck Research Team \/ /\ used SkyLined idea of exploitation special tnx goes to him \/ Affected Software : Microsoft Internet Explorer 6x, IE7 Beta 2 Sever ...
## # $Id: ms06_013_createtextrangerb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/cor ...
/* * * Internet Explorer "createTextRang" Download Shellcoded Exploit (2) * Bug discovered by Computer Terrorism (UK) * wwwcomputerterrorismcom/research/ct22-03-2006 * * Affected Software: Microsoft Internet Explorer 6x & 7 Beta 2 * Severity: Critical * Impact: Remote System Access * Solution Status: Unpatched * * E-Mail: atmaca@icqma ...
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 10 Transitional//EN" "wwww3org/TR/xhtml1/DTD/xhtml1-transitionaldtd"> <html> <fieldset> <h4> <pre><td> <menu> <legend> <a> <ul> <small> <fieldset> <h6> </h6 ></u> </optgroup> </tr> & ...

References

CWE-94http://www.securityfocus.com/archive/1/428441http://www.computerterrorism.com/research/ct22-03-2006http://www.securityfocus.com/bid/17196http://secunia.com/advisories/18680http://www.kb.cert.org/vuls/id/876678http://secunia.com/secunia_research/2006-7/advisory/http://www.microsoft.com/technet/security/advisory/917077.mspxhttp://www.osvdb.org/24050http://securitytracker.com/id?1015812http://www.us-cert.gov/cas/techalerts/TA06-101A.htmlhttp://archives.neohapsis.com/archives/fulldisclosure/2006-03/1434.htmlhttp://archives.neohapsis.com/archives/fulldisclosure/2006-03/1427.htmlhttp://archives.neohapsis.com/archives/fulldisclosure/2006-03/1430.htmlhttp://archives.neohapsis.com/archives/fulldisclosure/2006-03/1662.htmlhttp://www.ciac.org/ciac/bulletins/q-154.shtmlhttp://www.vupen.com/english/advisories/2006/1050http://www.vupen.com/english/advisories/2006/1318https://exchange.xforce.ibmcloud.com/vulnerabilities/25379https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A985https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1702https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1678https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1657https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1178https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013http://www.securityfocus.com/archive/1/429124/30/6120/threadedhttp://www.securityfocus.com/archive/1/429088/100/0/threadedhttp://www.securityfocus.com/archive/1/428600/100/0/threadedhttp://www.securityfocus.com/archive/1/428583/100/0/threadedhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/1620/https://www.kb.cert.org/vuls/id/876678