Vulnerability Note VU#417585
Microsoft DXImageTransform Light filter fails to validate input
The Microsoft DXImageTransform Light COM object fails to validate input, which may allow a remote attacker to execute arbitrary code on a vulnerable system.
Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Apply an update
Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Internet Explorer will not use the vulnerable DirectX Transform filters when ActiveX controls are disabled. Instructions for disabling ActiveX in the Internet Zone can be found in the document Securing Your Web Browser and the Malicious Web Scripts FAQ.
Note that disabling ActiveX controls in the Internet Zone will reduce the functionality of some web sites.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||07 Nov 2005||12 Jun 2006|
CVSS Metrics (Learn More)
This vulnerability was reported by Will Dormann and Dan Plakosh of CERT/CC
This document was written by Will Dormann.
- CVE IDs: CVE-2006-2383
- Date Public: 13 Jun 2006
- Date First Published: 13 Jun 2006
- Date Last Updated: 13 Apr 2009
- Severity Metric: 33.41
- Document Revision: 26
If you have feedback, comments, or additional information about this vulnerability, please send us email.