{"vuid":"VU#959649","idnumber":"959649","name":"Microsoft Internet Explorer fails to properly handle embedded objects","keywords":["Microsoft","Internet Explorer","IE","embedded object","IOleClientSite","ms06-apr"],"overview":"Microsoft Internet Explorer (IE) does not properly handle embedded dynamic objects. This vulnerability may allow a remote attacker to execute arbitrary code.","clean_desc":"IOleClientSite interface According to Microsoft Security Bulletin MS06-013, The IOleClientSite interface is the primary means by which an embedded object obtains information about the location and extent of its display site, its moniker, its user interface, and other resources provided by its container. For more information, see the product documentation. The Problem IE fails to properly handle embedded dynamic objects allowing a remote attacker to gain access to IOleClientSite information. An attacker may be able to leverage that information in a way that could allow them to bypass IE security settings. Considerations More information is available in Microsoft Security Bulletin MS06-013.","impact":"By convincing a user to open a specially crafted web page, a remote unauthenticated attacker can execute arbitrary code on a vulnerable.","resolution":"Apply an Update\nThis issue is addressed in Microsoft Security Bulletin MS06-013.","workarounds":"Refer to Microsoft Security Bulletin MS06-013 for workarounds for this vulnerability.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft  Security Bulletin \nMS06-013\n. Microsoft credits Heiko Schultze of \nSAP with providing information regarding this vulnerability.","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","B","u","l","l","e","t","i","n","/","M","S","0","6","-","0","1","3",".","m","s","p","x"],"cveids":["CVE-2006-1190"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-11T18:22:13Z","publicdate":"2006-04-11T00:00:00Z","datefirstpublished":"2006-04-11T19:48:06Z","dateupdated":"2006-04-11T19:49:01Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"20","cam_impact":"18","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"9.45","cam_scorecurrentwidelyknown":"11.8125","cam_scorecurrentwidelyknownexploited":"21.2625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.45,"vulnote":null}