CVE-2006-4868
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
19/09/2006
Última modificación:
03/04/2025
Descripción
Desbordamiento de búfer basado en el motor Vector Graphics Rendering (vgx.dll), tal y como se usa en Microsoft Outlook e Internet Explorer 6.0 en Windows XP SP2 y posiblemente otras versiones permite a atacantes remotos ejecutar código de su elección mediante un fichero Vector Markup Language (VML) con un parámetro "fill" largo dentro de una etiqueta "rect".
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://blogs.securiteam.com/index.php/archives/624
- http://secunia.com/advisories/21989
- http://securitytracker.com/id?1016879=
- http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html
- http://support.microsoft.com/kb/925486
- http://www.kb.cert.org/vuls/id/416092
- http://www.microsoft.com/technet/security/advisory/925568.mspx
- http://www.osvdb.org/28946
- http://www.securityfocus.com/archive/1/446378/100/0/threaded
- http://www.securityfocus.com/archive/1/446505/100/0/threaded
- http://www.securityfocus.com/archive/1/446523/100/0/threaded
- http://www.securityfocus.com/archive/1/446528/100/0/threaded
- http://www.securityfocus.com/archive/1/446881/100/200/threaded
- http://www.securityfocus.com/archive/1/447070/100/0/threaded
- http://www.securityfocus.com/archive/1/448552/100/0/threaded
- http://www.securityfocus.com/archive/1/448552/100/0/threaded
- http://www.securityfocus.com/bid/20096
- http://www.us-cert.gov/cas/techalerts/TA06-262A.html
- http://www.vupen.com/english/advisories/2006/3679
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29004
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100
- http://blogs.securiteam.com/index.php/archives/624
- http://secunia.com/advisories/21989
- http://securitytracker.com/id?1016879=
- http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html
- http://support.microsoft.com/kb/925486
- http://www.kb.cert.org/vuls/id/416092
- http://www.microsoft.com/technet/security/advisory/925568.mspx
- http://www.osvdb.org/28946
- http://www.securityfocus.com/archive/1/446378/100/0/threaded
- http://www.securityfocus.com/archive/1/446505/100/0/threaded
- http://www.securityfocus.com/archive/1/446523/100/0/threaded
- http://www.securityfocus.com/archive/1/446528/100/0/threaded
- http://www.securityfocus.com/archive/1/446881/100/200/threaded
- http://www.securityfocus.com/archive/1/447070/100/0/threaded
- http://www.securityfocus.com/archive/1/448552/100/0/threaded
- http://www.securityfocus.com/archive/1/448552/100/0/threaded
- http://www.securityfocus.com/bid/20096
- http://www.us-cert.gov/cas/techalerts/TA06-262A.html
- http://www.vupen.com/english/advisories/2006/3679
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29004
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100



