{"vuid":"VU#390044","idnumber":"390044","name":"Microsoft JScript memory corruption vulnerability","keywords":["Microsoft","JScript","remote code execution","ms06-june","MS06-023","memory corruption"],"overview":"Microsoft JScript contains a memory corruption vulnerability. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft JScript According to Microsoft Security Bulletin MS06-023: JScript is the Microsoft implementation of the ECMA 262 language specification (ECMAScript Edition 3). JScript is an interpreted, object-based scripting language. For more information see the product documentation. The Problem Microsoft JScript fails to properly release objects allowing in a memory corruption vulnerability to occur. When a specially crafted JScript file, or specially crafted web page containing JScript is accessed, system memory can be corrupted in a way that could allow a remote attacker to execute arbitrary code. Considerations For more information refer to Microsoft Security Bulletin MS06-023","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code. If the attacked user is running with administrative privileges, the attacker could take complete control of an affected system.","resolution":"Apply a patch from Microsoft\nMicrosoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-023.","workarounds":"Disable Active Scripting For instructions on how to disable Active Scripting in Microsoft Internet Explorer, please refer to the Internet Explorer section of the Securing Your Web Browser document. A complete list of workarounds is available in Microsoft Security Bulletin MS06-023.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin MS06-023","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-023.mspx","http://msdn.microsoft.com/library/default.asp?url=/library/en-us/script56/html/js56jsoriJScript.asp"],"cveids":["CVE-2006-1313"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-13T18:20:12Z","publicdate":"2006-06-13T00:00:00Z","datefirstpublished":"2006-06-13T19:28:39Z","dateupdated":"2006-06-13T19:41:18Z","revision":25,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"14","cam_population":"17","cam_impact":"19","cam_easeofexploitation":"12","cam_attackeraccessrequired":"18","cam_scorecurrent":"37.93635","cam_scorecurrentwidelyknown":"44.4771","cam_scorecurrentwidelyknownexploited":"70.6401","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":37.93635,"vulnote":null}