Описание
Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.
Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2766
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-043
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26810
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A441
- http://secunia.com/advisories/20384
- http://securitytracker.com/id?1016654
- http://www.kb.cert.org/vuls/id/891204
- http://www.osvdb.org/25949
- http://www.securityfocus.com/archive/1/435492/100/0/threaded
- http://www.securityfocus.com/archive/1/435609/100/0/threaded
- http://www.securityfocus.com/archive/1/435616/100/0/threaded
- http://www.securityfocus.com/bid/18198
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.vupen.com/english/advisories/2006/2088
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.
EPSS