[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-4868

Date: (C)2006-09-19   (M)2017-10-12
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.

Reference:
SECTRACK-1016879
http://www.securityfocus.com/archive/1/archive/1/446378/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446528/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446523/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446505/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446881/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/447070/100/0/threaded
BID-20096
SECUNIA-21989
OSVDB-28946
MSKB-925486
ADV-2006-3679
HPSBST02160
MS06-055
SSRT061254
TA06-262A
VU#416092
http://blogs.securiteam.com/index.php/archives/624
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html
http://www.microsoft.com/technet/security/advisory/925568.mspx
ie-vml-bo(29004)

CPE    3
cpe:/a:microsoft:outlook:2003
cpe:/a:microsoft:ie:6.0
cpe:/a:microsoft:ie:5.0.1:sp4
CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:100

© 2013 SecPod Technologies