Internet Explorer daxctle.ocx "KeyFrame()" Method Vulnerability



Secunia Advisory:  SA21910
Release Date:  2006-09-14
Last Update:  2006-09-15


Critical:
Extremely critical
Impact:  System access

Where:  From remote

Solution Status:  Unpatched


Software: Microsoft Internet Explorer 6.x



CVE reference: CVE-2006-4777 (Secunia mirror)




Description:
nop has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a memory corruption error in the Microsoft Multimedia Controls ActiveX control (daxctle.ocx) in the "CPathCtl::KeyFrame()" function. This can be exploited by e.g. tricking a user into viewing a malicious HTML document passing specially crafted arguments to the ActiveX control's "KeyFrame()" method.

Successful exploitation allows execution of arbitrary code.

NOTE: A somewhat working exploit is publicly available for partially patched versions of Windows 2000. However, Secunia has successfully created a fully working exploit for Windows XP SP2 (fully patched).

It is also possible to crash the browser via the "Spline()" method.

Solution:
Only allow trusted websites to run ActiveX controls.

Provided and/or discovered by:
nop

Changelog:
2006-09-15: Added Microsoft, US-CERT, and CVE references.

Original Advisory:
http://www.xsec.org/index.php?module=releases&act=view&type=2&id=20

Microsoft:
http://www.microsoft.com/technet/security/advisory/925444.mspx

Other References:
US-CERT VU#377369:
http://www.kb.cert.org/vuls/id/377369




Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to