[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4692Date: (C)2006-10-10   (M)2024-02-22


Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.1
Exploit Score: 4.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1017037
http://www.securityfocus.com/archive/1/448273/100/0/threaded
http://www.securityfocus.com/archive/1/448696/100/0/threaded
BID-20318
SECUNIA-20717
OSVDB-29424
ADV-2006-3984
MS06-065
SSRT061264
VU#703936
http://secunia.com/secunia_research/2006-54/advisory/
oval:org.mitre.oval:def:496

CWE    1
CWE-88
OVAL    1
oval:org.mitre.oval:def:496

© SecPod Technologies