CVE-2006-2094
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-362
Ejecución concurrente utilizando recursos compartidos con una incorrecta sincronización (Condición de carrera)
Fecha de publicación:
29/04/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking an object or pressing keys that are actually applied to a "Yes" approval for executing the control.
Impacto
Puntuación base 2.0
5.10
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:microsoft:ie:5:*:windows_nt_4.0:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0:*:windows_2000:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0:*:windows_95:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0:*:windows_98:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0.1:*:windows_2000:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0.1:*:windows_95:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0.1:*:windows_98:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:5.0.1:*:windows_nt_4.0:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html
- http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0759.html
- http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0019.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045589.html
- http://securitytracker.com/id?1015720=
- http://student.missouristate.edu/m/matthew007/advisories.asp?adv=2006-02
- http://www.osvdb.org/22351
- http://www.securityfocus.com/bid/17713
- http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/
- http://www.vupen.com/english/advisories/2006/1559
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26111
- http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html
- http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0759.html
- http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0019.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045589.html
- http://securitytracker.com/id?1015720=
- http://student.missouristate.edu/m/matthew007/advisories.asp?adv=2006-02
- http://www.osvdb.org/22351
- http://www.securityfocus.com/bid/17713
- http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/
- http://www.vupen.com/english/advisories/2006/1559
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26111