New Search

IE6 Double Byte Character Parsing Memory Corruption (Win2K/WinXP)

oval:org.mitre.oval:def:792

Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS) aka the "Double Byte Character Parsing Memory Corruption Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows 2000
  • Microsoft Windows XP
Class:
vulnerability
Reference(s):
  • CVE-2006-1189
Product(s):
  • Microsoft Internet Explorer