Description
Microsoft Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to cause a denial of service (application crash) by calling the stringToBinary function of the CEnroll.CEnroll.2 ActiveX object with a long second argument, which triggers an invalid memory access inside the SysAllocStringLen function.
Exploits (1)
References (5)
Core 5
Core References
Exploit, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19102
Not Applicable vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/2916
Broken Link vdb-entry
x_refsource_osvdb
http://www.osvdb.org/27230
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27884
Broken Link x_refsource_misc
http://browserfun.blogspot.com/2006/07/mobb-21-cenroll-stringtobinary.html
Scores
EPSS
0.1742
EPSS Percentile
95.1%
Details
Status
published
Products (1)
microsoft/internet_explorer
6.0 (3 CPE variants)
Published
Jul 27, 2006
Tracked Since
Feb 18, 2026