{"vuid":"VU#136849","idnumber":"136849","name":"Microsoft Internet Explorer UTF-8 decoding vulnerability","keywords":["Microsoft","HTML decoding","ms06-june","MS06-021","UTF-8"],"overview":"Microsoft Internet Explorer fails to properly decode UTF-8 encoded HTML. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Unicode The Unicode character set contains more than 96,000 characters. Because of this, Unicode can be used to represent a wide range of languages. UTF-8 UTF-8 (Unicode Tranlation Format 8) is a type of character encoding for Unicode character sets. The problem Internet Explorer fails to properly calculate memory sizes when decoding UTF-8 encoded characters. This can cause heap memory corruption.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the MSHTML component) to crash.","resolution":"Apply an update This issue is addressed in Microsoft Security Bulletin MS06-021. This update modifies the way that Internet Explorer decodes UTF-8 encoded HTML.","workarounds":"Read and send email in plain text format Outlook 2003, Outlook 2002 SP1, and Outlook 6 SP1 can be configured to view email messages in text format. Consider the security of fellow Internet users and send email in plain text format when possible. Do not follow unsolicited links In order to convince users to visit their sites, attackers often use URL encoding, IP address variations, long URLs, intentional misspellings, and other techniques to create misleading links. Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.","sysaffected":"","thanks":"Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, thanks Tippingpoint for reporting this issue.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/Bulletin/MS06-021.mspx","http://www.zerodayinitiative.com/advisories/ZDI-06-017.html"],"cveids":["CVE-2006-2382"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-13T18:06:22Z","publicdate":"2006-06-13T00:00:00Z","datefirstpublished":"2006-06-13T18:58:34Z","dateupdated":"2006-06-13T18:58:58Z","revision":2,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"19","cam_scorecurrent":"17.206875","cam_scorecurrentwidelyknown":"26.184375","cam_scorecurrentwidelyknownexploited":"41.146875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.206875,"vulnote":null}