{"vuid":"VU#821156","idnumber":"821156","name":"Microsoft Internet Explorer long URL buffer overflow","keywords":["Microsoft","Internet Explorer","IE","buffer overflow","URL","HTTP 1.1","compression"],"overview":"Microsoft Internet Explorer is vulnerable to a buffer overflow when processing a long URL on a web site that uses HTTP 1.1 compression. This could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft Internet Explorer 6 Service Pack 1 on Windows 2000 and Windows XP SP1 contains a vulnerability when viewing a web site using the HTTP 1.1 protocol. If the web site uses HTTP 1.1 compression and contains an overly long URL, a buffer overflow can occur. Note that this vulnerability was introduced with the first release of the MS06-042 updates on August 8, 2006.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser ActiveX control) to crash.","resolution":"Apply an update\nThis vulnerability is addressed in Microsoft Security Bulletin MS06-042 version 2.0.","workarounds":"Disable Active Scripting This vulnerability can be mitigated by disabling Active Scripting, as specified in the \"Securing Your Web Browser\" document. While this does not remove the vulnerability, it does block known techniques to exploit this vulnerability to execute arbitrary code. Disable HTTP 1.1 This vulnerability can be mitigated by disabling HTTP 1.1, as specified in Microsoft Security Advisory 923762.","sysaffected":"","thanks":"Thanks to \nDejan Kovacevic of Bold Internet Solutions\n for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/advisory/923762.mspx","http://www.microsoft.com/technet/security/Bulletin/MS06-042.mspx","http://support.microsoft.com/?kbid=918899","http://www.w3.org/Protocols/rfc2616/rfc2616.html","http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.5","http://research.eeye.com/html/alerts/AL20060822.html","http://www.securityfocus.com/bid/19667"],"cveids":["CVE-2006-3869"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-21T19:26:10Z","publicdate":"2006-08-22T00:00:00Z","datefirstpublished":"2006-08-22T20:39:45Z","dateupdated":"2006-08-24T18:12:40Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"18","cam_scorecurrent":"13.365","cam_scorecurrentwidelyknown":"36.45","cam_scorecurrentwidelyknownexploited":"60.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.365,"vulnote":null}