Vulnerability Note VU#821156
Microsoft Internet Explorer long URL buffer overflow
Microsoft Internet Explorer is vulnerable to a buffer overflow when processing a long URL on a web site that uses HTTP 1.1 compression. This could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Internet Explorer 6 Service Pack 1 on Windows 2000 and Windows XP SP1 contains a vulnerability when viewing a web site using the HTTP 1.1 protocol. If the web site uses HTTP 1.1 compression and contains an overly long URL, a buffer overflow can occur.
Note that this vulnerability was introduced with the first release of the MS06-042 updates on August 8, 2006.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser ActiveX control) to crash.
Apply an update
Disable Active Scripting
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||21 Aug 2006||24 Aug 2006|
CVSS Metrics (Learn More)
Thanks to Dejan Kovacevic of Bold Internet Solutions for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-3869
- Date Public: 22 Aug 2006
- Date First Published: 22 Aug 2006
- Date Last Updated: 24 Aug 2006
- Severity Metric: 13.37
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.