CVE-2006-4777

EXPLOITED

Internet Explorer 6.0 SP1 - Buffer Overflow

Title source: llm

Description

Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16506
exploitdb WORKING POC VERIFIED
by nop · cremotewindows
https://www.exploit-db.com/exploits/2358
nomisec WORKING POC
by Mario1234 · client-side
https://github.com/Mario1234/js-driveby-download-CVE-2006-4777
metasploit WORKING POC NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ms06_067_keyframe.rb

References (18)

Scores

EPSS 0.8757
EPSS Percentile 99.5%

Details

VulnCheck KEV 2006-11-14
CWE
CWE-119
Status published
Products (1)
microsoft/ie 6.0 sp1
Published Sep 14, 2006
Tracked Since Feb 18, 2026