Check Point Advisories

Update Protection against setSlice Integer Overflow Vulnerability (MS06-057)

Check Point Reference: CPAI-2006-127
Date Published: 13 Nov 2006
Severity: Critical
Last Updated: 15 May 2007
Source: Microsoft Security Bulletin MS06-057
Industry Reference:CVE-2006-3730
US-CERT VU#753044
Protection Provided by:
Who is Vulnerable? Microsoft Windows 2000 SP4
Microsoft Windows XP SP1
Microsoft Windows XP SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 for (Itanium)
Microsoft Windows Server 2003 with SP1 for (Itanium)
Microsoft Windows Server 2003 x64 Edition
Vulnerability Description Microsoft Internet Explorer (IE) contains a remote code execution vulnerability. The vulnerability exists in Microsoft WebViewFolderIcon object, which is an ActiveX control that provides support functionality for icons in the Windows Explorer Web view. By persuading a user to visit a specially crafted Web page, a remote attacker could trigger this vulnerability to deny service from legitimate users (by causing the victim's Web browser to crash) or execute arbitrary code on an affected system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS06-057
Vulnerability DetailsThe vulnerability occurs in the Microsoft WebViewFolderIcon (webvw.dll) when processing a malformed WebViewFolderIcon ActiveX object with an invalid argument to the 'setSlice' method. A remote attacker can trigger this flaw by convincing a user to view a specially crafted HTML document. Successful exploitation could result in the crashing of the victim's Web browser, once the malicious page is loaded and allows execution of arbitrary code.

Protection Overview