ID

VAR-200611-0102


CVE

CVE-2006-5745


TITLE

Microsoft XML Core Services XMLHTTP ActiveX control vulnerability

Trust: 0.8

sources: CERT/CC: VU#585137

DESCRIPTION

Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information. Failed exploit attempts will result in a denial-of-service condition. An attacker could exploit this vulnerability by crafting a specially crafted web page that could allow remote code execution if a user visits the web page or clicks a link in an email message. However, user interaction is required to exploit this vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-318A Microsoft Security Updates for Windows, Internet Explorer, and Adobe Flash Original release date: November 14, 2006 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Adobe Flash Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, and Adobe Flash. I. Description Microsoft has released updates to address vulnerabilities in Microsoft Windows, Internet Explorer, and Adobe Flash as part of the Microsoft Security Bulletin Summary for November 2006. Microsoft has included updates to Adobe Flash, which is installed with Internet Explorer. Further information is available in the Vulnerability Notes Database. II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the November 2006 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Note any known issues described in the Bulletins and test for any potentially adverse affects in your environment. System administrators may wish to consider using Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft November 2006 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms06-nov> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for November 2006 - <http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-318A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-318A Feedback VU#377369" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History November 14, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRVpHwexOF3G+ig+rAQLUEAf9FSKBHOCuPIRuJYJYgY9th7ZRtNdxsWWQ 4ulkdZVv3P682sQEtF6glpLN1h+YHA1oF93uLp6T+7FKlxP1MYrxRPP5p1nH+fCa bRmVxUSATuDrxaTZmJWcJcL8zvaNTqkkDBCpG8GN32OCwgE40xNJRsKiv2UuIAYJ geGl8mK5PGb4Sr0Bjlw2n5fbcKkjoJXYmkxV3CXzvpPrtS1fIq0rZ19sRB4+Jw3I heEM7rKGMo3N4OUEYTpt2yW1Mpj2zVyWo2O8PWJmuMZq1lCsECrvTvfk4/q3s4Yh Z0l6F4Ps6L2D5PkNkg08EgxvbiPHYI8B8VZ1SlitvOcKiVOggyxYrg== =K0Wj -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Microsoft XMLHTTP ActiveX Control Code Execution Vulnerability SECUNIA ADVISORY ID: SA22687 VERIFY ADVISORY: http://secunia.com/advisories/22687/ CRITICAL: Extremely critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ SOFTWARE: Microsoft Core XML Services (MSXML) 4.x http://secunia.com/product/6472/ DESCRIPTION: A vulnerability has been reported in Microsoft XML Core Services, which can be exploited by malicious people to compromise a users system. The vulnerability is caused due to an unspecified error in the XMLHTTP 4.0 ActiveX Control. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website using Internet Explorer. NOTE: The vulnerability is already being actively exploited. SOLUTION: Microsoft has recommended various workarounds including setting the kill-bit for the affected ActiveX control (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Discovered as a 0-day. ORIGINAL ADVISORY: Microsoft http://www.microsoft.com/technet/security/advisory/927892.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2006-5745 // CERT/CC: VU#585137 // JVNDB: JVNDB-2006-000756 // BID: 20915 // VULHUB: VHN-21853 // PACKETSTORM: 52175 // PACKETSTORM: 51658

AFFECTED PRODUCTS

vendor:microsoftmodel:xml core servicesscope:eqversion:4.0

Trust: 1.9

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel:xml core servicescope:eqversion:4.0

Trust: 0.8

vendor:microsoftmodel:xml core servicescope:eqversion:6.0

Trust: 0.8

vendor:microsoftmodel:xml core servicesscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:storage management appliancescope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:s8100 media servers r9scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r8scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r7scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r6scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r12scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r11scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media servers r10scope: - version: -

Trust: 0.3

vendor:avayamodel:s8100 media serversscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#585137 // BID: 20915 // JVNDB: JVNDB-2006-000756 // CNNVD: CNNVD-200611-068 // NVD: CVE-2006-5745

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5745
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#585137
value: 29.77

Trust: 0.8

NVD: CVE-2006-5745
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200611-068
value: HIGH

Trust: 0.6

VULHUB: VHN-21853
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-5745
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-21853
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#585137 // VULHUB: VHN-21853 // JVNDB: JVNDB-2006-000756 // CNNVD: CNNVD-200611-068 // NVD: CVE-2006-5745

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-5745

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 52175 // CNNVD: CNNVD-200611-068

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 20915 // CNNVD: CNNVD-200611-068

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000756

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-21853

PATCH

title:927892url:http://www.microsoft.com/technet/security/advisory/927892.mspx

Trust: 0.8

title:MS06-071url:http://www.microsoft.com/technet/security/bulletin/MS06-071.mspx

Trust: 0.8

title:927892url:http://www.microsoft.com/japan/technet/security/advisory/927892.mspx

Trust: 0.8

title:MS06-071url:http://www.microsoft.com/japan/technet/security/bulletin/MS06-071.mspx

Trust: 0.8

title:MS06-071eurl:http://www.microsoft.com/japan/security/bulletins/MS06-071e.mspx

Trust: 0.8

sources: JVNDB: JVNDB-2006-000756

EXTERNAL IDS

db:BIDid:20915

Trust: 3.6

db:SECUNIAid:22687

Trust: 3.4

db:CERT/CCid:VU#585137

Trust: 3.3

db:NVDid:CVE-2006-5745

Trust: 2.8

db:USCERTid:TA06-318A

Trust: 2.6

db:SECTRACKid:1017157

Trust: 1.7

db:EXPLOIT-DBid:2743

Trust: 1.7

db:VUPENid:ADV-2006-4334

Trust: 1.7

db:USCERTid:SA06-318A

Trust: 0.8

db:JVNDBid:JVNDB-2006-000756

Trust: 0.8

db:CNNVDid:CNNVD-200611-068

Trust: 0.7

db:MSid:MS06-071

Trust: 0.6

db:MILW0RMid:2743

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:104

Trust: 0.6

db:CERT/CCid:TA06-318A

Trust: 0.6

db:XFid:30004

Trust: 0.6

db:ISSid:20061104 VULNERABILITY IN MICROSOFT XML HTTP REQUEST HANDLING

Trust: 0.6

db:EXPLOIT-DBid:16532

Trust: 0.1

db:EXPLOIT-DBid:2753

Trust: 0.1

db:EXPLOIT-DBid:2749

Trust: 0.1

db:SEEBUGid:SSVID-71046

Trust: 0.1

db:SEEBUGid:SSVID-459

Trust: 0.1

db:PACKETSTORMid:83032

Trust: 0.1

db:VULHUBid:VHN-21853

Trust: 0.1

db:PACKETSTORMid:52175

Trust: 0.1

db:PACKETSTORMid:51658

Trust: 0.1

sources: CERT/CC: VU#585137 // VULHUB: VHN-21853 // BID: 20915 // JVNDB: JVNDB-2006-000756 // PACKETSTORM: 52175 // PACKETSTORM: 51658 // CNNVD: CNNVD-200611-068 // NVD: CVE-2006-5745

REFERENCES

url:http://www.securityfocus.com/bid/20915

Trust: 3.3

url:http://www.microsoft.com/technet/security/advisory/927892.mspx

Trust: 2.9

url:http://www.microsoft.com/technet/security/bulletin/ms06-071.mspx

Trust: 2.5

url:http://xforce.iss.net/xforce/alerts/id/239

Trust: 2.5

url:http://blogs.securiteam.com/?p=717

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta06-318a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/585137

Trust: 2.5

url:http://secunia.com/advisories/22687/

Trust: 1.7

url:http://www.iss.net/threats/239.html

Trust: 1.7

url:http://securitytracker.com/id?1017157

Trust: 1.7

url:http://secunia.com/advisories/22687

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2006/4334

Trust: 1.4

url:https://www.exploit-db.com/exploits/2743

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-071

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a104

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4334

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30004

Trust: 1.1

url:http://isc.sans.org/diary.php?storyid=1823

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5745

Trust: 0.8

url:http://www.jpcert.or.jp/at/2006/at060019.txt

Trust: 0.8

url:http://www.jpcert.or.jp/at/2006/at060018.txt

Trust: 0.8

url:http://www.jpcert.or.jp/at/2007/at070016.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23585137/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-318a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta06-318a

Trust: 0.8

url:http://jvn.jp/tr/trvu%23585137/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-5745

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa06-318a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2006/20061105_092738.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2006/20061115_072449.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/30004

Trust: 0.6

url:http://www.milw0rm.com/exploits/2743

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:104

Trust: 0.6

url:http://blogs.pandasoftware.com/blogs/images/pandalabs/2007/05/11/mpack.pdf

Trust: 0.3

url:http://www.microsoft.com/

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-253.htm

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx>

Trust: 0.1

url:https://update.microsoft.com/microsoftupdate/>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-318a.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms06-nov>

Trust: 0.1

url:http://secunia.com/product/1173/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/22/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/product/1/

Trust: 0.1

url:http://secunia.com/product/21/

Trust: 0.1

url:http://secunia.com/product/1174/

Trust: 0.1

url:http://secunia.com/product/1176/

Trust: 0.1

url:http://secunia.com/product/1175/

Trust: 0.1

url:http://secunia.com/product/6472/

Trust: 0.1

url:http://secunia.com/product/16/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/1177/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/20/

Trust: 0.1

sources: CERT/CC: VU#585137 // VULHUB: VHN-21853 // BID: 20915 // JVNDB: JVNDB-2006-000756 // PACKETSTORM: 52175 // PACKETSTORM: 51658 // CNNVD: CNNVD-200611-068 // NVD: CVE-2006-5745

CREDITS

Microsoft

Trust: 0.6

sources: CNNVD: CNNVD-200611-068

SOURCES

db:CERT/CCid:VU#585137
db:VULHUBid:VHN-21853
db:BIDid:20915
db:JVNDBid:JVNDB-2006-000756
db:PACKETSTORMid:52175
db:PACKETSTORMid:51658
db:CNNVDid:CNNVD-200611-068
db:NVDid:CVE-2006-5745

LAST UPDATE DATE

2024-08-14T12:58:51.229000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#585137date:2006-11-14T00:00:00
db:VULHUBid:VHN-21853date:2018-10-12T00:00:00
db:BIDid:20915date:2007-05-15T20:48:00
db:JVNDBid:JVNDB-2006-000756date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200611-068date:2008-12-15T00:00:00
db:NVDid:CVE-2006-5745date:2018-10-12T21:41:43.373

SOURCES RELEASE DATE

db:CERT/CCid:VU#585137date:2006-11-05T00:00:00
db:VULHUBid:VHN-21853date:2006-11-06T00:00:00
db:BIDid:20915date:2006-11-03T00:00:00
db:JVNDBid:JVNDB-2006-000756date:2007-04-01T00:00:00
db:PACKETSTORMid:52175date:2006-11-16T16:02:41
db:PACKETSTORMid:51658date:2006-11-06T05:09:25
db:CNNVDid:CNNVD-200611-068date:2006-11-06T00:00:00
db:NVDid:CVE-2006-5745date:2006-11-06T18:07:00