CVE-2006-4534
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/09/2006
Last modified:
03/04/2025
Description
Unspecified vulnerability in Microsoft Word 2000, 2002, and Office 2003 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors involving a crafted file resulting in a malformed stack, as exploited by malware with names including Trojan.Mdropper.Q, Mofei, and Femo.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os:*:* | ||
cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os:*:* | ||
cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blogs.securiteam.com/?p=586
- http://isc.sans.org/diary.php?storyid=1669
- http://secunia.com/advisories/21735
- http://securitytracker.com/id?1016787=
- http://support.microsoft.com/kb/925059
- http://vil.mcafeesecurity.com/vil/content/v_119055.htm
- http://www.kb.cert.org/vuls/id/806548
- http://www.microsoft.com/technet/security/advisory/925059.mspx
- http://www.osvdb.org/28539
- http://www.securityfocus.com/archive/1/445162/100/100/threaded
- http://www.securityfocus.com/archive/1/445285/100/0/threaded
- http://www.securityfocus.com/archive/1/445381/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/bid/19835
- http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-090219-2855-99
- http://www.vupen.com/english/advisories/2006/3448
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28775
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A578
- http://blogs.securiteam.com/?p=586
- http://isc.sans.org/diary.php?storyid=1669
- http://secunia.com/advisories/21735
- http://securitytracker.com/id?1016787=
- http://support.microsoft.com/kb/925059
- http://vil.mcafeesecurity.com/vil/content/v_119055.htm
- http://www.kb.cert.org/vuls/id/806548
- http://www.microsoft.com/technet/security/advisory/925059.mspx
- http://www.osvdb.org/28539
- http://www.securityfocus.com/archive/1/445162/100/100/threaded
- http://www.securityfocus.com/archive/1/445285/100/0/threaded
- http://www.securityfocus.com/archive/1/445381/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/archive/1/449179/100/0/threaded
- http://www.securityfocus.com/bid/19835
- http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-090219-2855-99
- http://www.vupen.com/english/advisories/2006/3448
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28775
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A578