CVE-2006-3637
Scores
EPSS
Percentile: 77.3%
CVSS
CVSS Score: 5.1/10
All CVSS Scores
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
High (H)
Describes the conditions beyond the attacker's control
Authentication
None (N)
Describes the level of privileges an attacker must possess
Confidentiality Impact
Partial
Measures the impact to the confidentiality of information
Integrity Impact
Partial
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Partial
Measures the impact to the availability of the impacted component
Description
Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle various HTML layout component combinations, which allows user-assisted remote attackers to execute arbitrary code via a crafted HTML file that leads to memory corruption, aka “HTML Rendering Memory Corruption Vulnerability.”
Scaner-VS 7 — a modern vulnerability management solution
Sources
Exploits
Recommendations
Source: nvd
Apply an updateThis vulnerability is addressed in Microsoft Security Bulletin MS06-042.Note that this patch may cause problems for certain users. Per Microsoft Knowledgebase Article 923762:Consider the following scenario. You run Microsoft Internet Explorer 6 Service Pack 1 (SP1) on a computer that is running Microsoft Windows XP with Service Pack (SP1) or Microsoft Windows 2000 with Service Pack 4 (SP4). You install the Internet Explorer cumulative security update that is documented in Microsoft Knowledge Base article 918899. In this scenario, Internet Explorer unexpectedly exits when you view a Web site that uses the HTTP 1.1 protocol and compression. Disable Active ScriptingThis vulnerability can be mitigated by disabling Active Scripting, as specified in the “Securing Your Web Browser” document. Although this does not remove the vulnerability, it does block known attack vectors.
Vulnerable Software (2)
Type: Configuration
Vendor: microsoft
Product: ie
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:microsoft:internet_explore...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: microsoft
Product: internet_explorer
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:microsoft:internet_explore...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd