CVE-2006-0013
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/02/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Buffer overflow in the Web Client service (WebClnt.dll) for Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote authenticated users or Guests to execute arbitrary code via crafted RPC requests, a different vulnerability than CVE-2005-1207.
Impacto
Puntuación base 2.0
6.50
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/18857
- http://securitytracker.com/id?1015630=
- http://www.kb.cert.org/vuls/id/388900
- http://www.securityfocus.com/bid/16636
- http://www.vupen.com/english/advisories/2006/0577
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24491
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1220
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1547
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1602
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A683
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A716
- http://secunia.com/advisories/18857
- http://securitytracker.com/id?1015630=
- http://www.kb.cert.org/vuls/id/388900
- http://www.securityfocus.com/bid/16636
- http://www.vupen.com/english/advisories/2006/0577
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24491
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1220
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1547
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1602
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A683
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A716