{"vuid":"VU#984473","idnumber":"984473","name":"Microsoft Internet Explorer contains overflow in processing script action handlers","keywords":["MS06-013","onclick","mshtml.dll","Microsoft","Internet Explorer","ms06-apr"],"overview":"A vulnerability in the Microsoft Internet Explorer web browser could allow a remote attacker to crash the browser or possibly execute arbitrary code on a vulnerable system.","clean_desc":"A programming error in the way that Internet Explorer handles multiple event handlers in an HTML element results in an array out-of-bounds memory access. This error results in a vulnerability that could allow an attacker to execute code on a vulnerable system. An attacker could exploit this vulnerability by constructing a malicious web page and tricking or persuading a user to visit the malicious site.","impact":"A remote attacker can cause a vulnerable version of the browser to crash. In some cases, it may also be possible for the attacker to execute code of their choosing on an affected system. The attacker-supplied code would be executed with the permissions of the user running the vulnerable version of the browser.","resolution":"Apply a patch Microsoft has published patches for this issue in Microsoft Security Bulletin MS06-013. Users are encouraged to review this bulletin and apply the patches it refers to.","workarounds":"","sysaffected":"","thanks":"Michal Zalewski publicly reported this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.microsoft.com/technet/security/Bulletin/MS06-013.mspx","http://secunia.com/advisories/19269/"],"cveids":["CVE-2006-1245"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-03-17T03:00:25Z","publicdate":"2006-03-16T00:00:00Z","datefirstpublished":"2006-04-11T19:58:55Z","dateupdated":"2006-04-11T20:00:47Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"4","cam_internetinfrastructure":"10","cam_population":"19","cam_impact":"19","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"23.01375","cam_scorecurrentwidelyknown":"23.01375","cam_scorecurrentwidelyknownexploited":"33.84375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":23.01375,"vulnote":null}