There's a heap-based buffer-overflow vulnerability within Internet Explorer 6. The flaw resides in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) and, when properly executed, allows remote attackers to execute arbitrary code. This is possible via unknown arguments added to the KeyFrame method, possibly related to an integer overflow. There is no patch at this time. A workaround is to disable Active Script in IE.
- Vendor Patch Information: MS06-067.
- Microsoft: Advisory 92544
- US-CERT Technical Alert: TA06-270A
- US-CERT Vulnerability Note: VU#377369
- FrSIRT: #3593
- Secunia: #21910