Intrusion Prevention

MS.XML.Core.Service.XMLHTTP.ActiveX.Code.Execution

Description

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft XML Core Services.
The vulnerability, which is located in the "XMLHTTP" ActiveX Control, can be exploited through misuse of the "setRequestHeader()" method. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash, resulting in a Denial of Service condition.

Affected Products

Microsoft Corporation: Microsoft Internet Explorer, any version
Microsoft Corporation: Windows 95
Microsoft Corporation: Windows 98
Microsoft Corporation: Windows 98 Second Edition
Microsoft Corporation: Windows Me
Microsoft Corporation: Windows XP
Microsoft Corporation: Windows 2000 Any version
Microsoft Corporation: Windows 2003 Any version
Microsoft Corporation: Windows NT 4.0

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.

Recommended Actions

Apply the patch available from the web site:
http://www.microsoft.com/technet/security/Bulletin/MS06-071.mspx

CVE References

CVE-2006-5745