CVE-2006-3650
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
10/10/2006
Last modified:
09/04/2025
Description
Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac do not properly parse the length of a chart record, which allows remote user-assisted attackers to execute arbitrary code via a Word document with an embedded malformed chart record that triggers an overwrite of pointer values with values from the document, a different vulnerability than CVE-2006-3434, CVE-2006-3864, and CVE-2006-3868.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os:*:* | ||
cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os:*:* | ||
cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/22339
- http://securitytracker.com/id?1017034=
- http://www.kb.cert.org/vuls/id/534276
- http://www.osvdb.org/29428
- http://www.securityfocus.com/archive/1/448151/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/bid/20383
- http://www.vupen.com/english/advisories/2006/3981
- http://www.zerodayinitiative.com/advisories/ZDI-06-034.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A222
- http://secunia.com/advisories/22339
- http://securitytracker.com/id?1017034=
- http://www.kb.cert.org/vuls/id/534276
- http://www.osvdb.org/29428
- http://www.securityfocus.com/archive/1/448151/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/bid/20383
- http://www.vupen.com/english/advisories/2006/3981
- http://www.zerodayinitiative.com/advisories/ZDI-06-034.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A222