=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2006/VULN159
_____________________________________________________________________

DATE                      : 12/04/2006

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Microsoft Windows, systems running Internet
                              Explorer.

======================================================================

                         National Cyber Alert System

                 Technical Cyber Security Alert TA06-101A


Microsoft Windows and Internet Explorer Vulnerabilities

    Original release date: April 11, 2006
    Last revised: --
    Source: US-CERT


Systems Affected

      * Microsoft Windows
      * Microsoft Internet Explorer

    For more complete information, refer to the Microsoft Security
    Bulletin Summary for April 2006.


Overview

    Microsoft has released updates that address critical vulnerabilities
    in Microsoft Windows and Internet Explorer. Exploitation of these
    vulnerabilities could allow a remote, unauthenticated attacker to
    execute arbitrary code or cause a denial of service on a vulnerable
    system.


I. Description

    Microsoft Security Bulletin Summary for April 2006 addresses
    vulnerabilities in Microsoft Windows and Internet Explorer. Further
    information is available in the following US-CERT Vulnerability Notes:


    VU#876678 - Microsoft Internet Explorer createTextRange()
    vulnerability

    Microsoft Internet Explorer fails to properly handle the
    createTextRange() DHTML method, possibly allowing a remote,
    unauthenticated attacker to execute arbitrary code.
    (CVE-2006-1359)


    VU#984473 - Microsoft Internet Explorer contains overflow in
    processing script action handlers

    A vulnerability in the Microsoft Internet Explorer web browser could
    allow a remote attacker to crash the browser or possibly execute
    arbitrary code on a vulnerable system.
    (CVE-2006-1245)


    VU#434641 - Microsoft Internet Explorer may automatically execute HTA
    files

    Microsoft Internet Explorer fails to properly handle HTA files. This
    vulnerability may allow a remote attacker to execute arbitrary code.
    (CVE-2006-1388)


    VU#503124 - Microsoft Internet Explorer fails to handle specially
    crafted, malformed HTML

    Microsoft Internet Explorer fails to properly handle malformed HTML.
    This vulnerability may allow a remote attacker to execute arbitrary
    code on a vulnerable system.
    (CVE-2006-1185)


    VU#959049 - Multiple COM objects cause memory corruption in Microsoft
    Internet Explorer

    Microsoft Internet Explorer allows instantiation of COM objects not
    designed for use in the browser, which may allow a remote attacker to
    execute arbitrary code or crash IE.
    (CVE-2006-1186)


    VU#824324 - Microsoft Internet Explorer fails to properly handle HTML
    elements with a specially crafted tag

    Microsoft Internet Explorer fails to properly handle HTML element
    tags, which may allow a remote, unauthenticated attacker to execute
    arbitrary code.
    (CVE-2006-1188)


    VU#341028 - Microsoft Internet Explorer fails to properly handle
    double-byte characters in specially crafted URLs

    Microsoft Internet Explorer fails to properly handle double-byte
    characters in URLs, which may allow a remote, unauthenticated attacker
    to execute arbitrary code.
    (CVE-2006-1189)


    VU#234812 - Microsoft Windows contains a vulnerability in the
    RDS.Dataspace ActiveX control in MDAC

    Microsoft Windows fails to properly handle the RDS.Dataspace ActiveX
    control possibly allowing a remote attacker to execute arbitrary code.
    (CVE-2006-0003)


    VU#641460 - Microsoft Windows Explorer fails to properly handle COM
    objects

    Microsoft Windows fails to properly handle COM Objects. This
    vulnerability may allow a remote unauthenticated attacker to execute
    arbitrary code on a vulnerable system.
    (CVE-2006-0012)


II. Impact

    A remote, unauthenticated attacker could execute arbitrary code with
    the privileges of the user. If the user is logged on with
    administrative privileges, the attacker could take complete control of
    an affected system. An attacker may also be able to cause a denial of
    service.


III. Solution

Apply Updates

    Microsoft has provided updates for these vulnerabilities in the
    Security Bulletins and on the Microsoft Update site.

Workarounds

    Please see the US-CERT Vulnerability Notes for workarounds. Many of
    these vulnerabilities can be mitigated by following the instructions
    listed in the Securing Your Web Browser document.

Appendix A. References

      * Microsoft Security Bulletin Summary for April 2006 -
        <http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx>

      * US-CERT Vulnerability Note VU#876678 -
        <http://www.kb.cert.org/vuls/id/876678>

      * US-CERT Vulnerability Note VU#984473 -
        <http://www.kb.cert.org/vuls/id/984473>

      * US-CERT Vulnerability Note VU#434641 -
        <http://www.kb.cert.org/vuls/id/434641>

      * US-CERT Vulnerability Note VU#503124 -
        <http://www.kb.cert.org/vuls/id/503124>

      * US-CERT Vulnerability Note VU#959049 -
        <http://www.kb.cert.org/vuls/id/959049>

      * US-CERT Vulnerability Note VU#824324 -
        <http://www.kb.cert.org/vuls/id/824324>

      * US-CERT Vulnerability Note VU#341028 -
        <http://www.kb.cert.org/vuls/id/341028>

      * US-CERT Vulnerability Note VU#234812 -
        <http://www.kb.cert.org/vuls/id/234812>

      * US-CERT Vulnerability Note VU#641460 -
        <http://www.kb.cert.org/vuls/id/641460>

      * CVE-2006-1359 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1359>

      * CVE-2006-1245 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1245>

      * CVE-2006-1388 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1388>

      * CVE-2006-1185 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1185>

      * CVE-2006-1186 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1186>

      * CVE-2006-1188 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1188>

      * CVE-2006-1189 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1189>

      * CVE-2006-0003 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0003>

      * CVE-2006-0012 -
        <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0012>

      * Microsoft Update - <https://update.microsoft.com/microsoftupdate>

      * Securing Your Web Browser -
        <http://www.us-cert.gov/reading_room/securing_browser/#Internet_Ex
        plorer>


  ____________________________________________________________________

    The most recent version of this document can be found at:

      <http://www.us-cert.gov/cas/techalerts/TA06-101A.html>
  ____________________________________________________________________

    Feedback can be directed to US-CERT Technical Staff. Please send
    email to <cert@cert.org> with "TA06-101A Feedback VU#876678" in the
    subject.
  ____________________________________________________________________

    For instructions on subscribing to or unsubscribing from this
    mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
  ____________________________________________________________________

    Produced 2006 by US-CERT, a government organization.

    Terms of use:

      <http://www.us-cert.gov/legal.html>
  ____________________________________________________________________


Revision History

    Apr 11, 2006: Initial release


======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================





