wininet.dll in Microsoft Internet Explorer 6.0 SP2 and earlier allows remote attackers to cause a denial of service (unhandled exception and crash) via a long Content-Type header, which triggers a stack overflow.
                
            References
                    | Link | Resource | 
|---|---|
| http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html | Broken Link | 
| http://www.securityfocus.com/bid/19092 | Exploit Third Party Advisory VDB Entry | 
| http://www.osvdb.org/29129 | Broken Link | 
| http://securityreason.com/securityalert/1683 | Exploit Third Party Advisory | 
| http://www.vupen.com/english/advisories/2006/2917 | Not Applicable | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/27900 | Broken Link | 
| https://www.exploit-db.com/exploits/2039 | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2006-10-04 21:04
Updated : 2021-12-13 10:51
NVD link : CVE-2006-5162
Mitre link : CVE-2006-5162
JSON object : View
CWE
                Products Affected
                microsoft
- internet_explorer
 


