CVE-2006-0020

An unspecified Microsoft WMF parsing application, as used in Internet Explorer 5.01 SP4 on Windows 2000 SP4, and 5.5 SP2 on Windows Millennium, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute code via a crafted WMF file with a manipulated WMF header size, possibly involving an integer overflow, a different vulnerability than CVE-2005-4560, and aka "WMF Image Parsing Memory Corruption Vulnerability."
References
Link Resource
http://linuxbox.org/pipermail/funsec/2006-January/002828.html Exploit Vendor Advisory
http://secunia.com/advisories/18729 Patch Vendor Advisory
http://secunia.com/advisories/18912 Vendor Advisory
http://www.kb.cert.org/vuls/id/312956 Patch Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/913333.mspx Vendor Advisory
http://www.osvdb.org/22976
http://www.securityfocus.com/bid/16516 Patch
http://www.us-cert.gov/cas/techalerts/TA06-045A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0469
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638
http://linuxbox.org/pipermail/funsec/2006-January/002828.html Exploit Vendor Advisory
http://secunia.com/advisories/18729 Patch Vendor Advisory
http://secunia.com/advisories/18912 Vendor Advisory
http://www.kb.cert.org/vuls/id/312956 Patch Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/913333.mspx Vendor Advisory
http://www.osvdb.org/22976
http://www.securityfocus.com/bid/16516 Patch
http://www.us-cert.gov/cas/techalerts/TA06-045A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0469
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://linuxbox.org/pipermail/funsec/2006-January/002828.html - Exploit, Vendor Advisory () http://linuxbox.org/pipermail/funsec/2006-January/002828.html - Exploit, Vendor Advisory
References () http://secunia.com/advisories/18729 - Patch, Vendor Advisory () http://secunia.com/advisories/18729 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18912 - Vendor Advisory () http://secunia.com/advisories/18912 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/312956 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/312956 - Patch, Third Party Advisory, US Government Resource
References () http://www.microsoft.com/technet/security/advisory/913333.mspx - Vendor Advisory () http://www.microsoft.com/technet/security/advisory/913333.mspx - Vendor Advisory
References () http://www.osvdb.org/22976 - () http://www.osvdb.org/22976 -
References () http://www.securityfocus.com/bid/16516 - Patch () http://www.securityfocus.com/bid/16516 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-045A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-045A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2006/0469 - () http://www.vupen.com/english/advisories/2006/0469 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638 -

Information

Published : 2006-01-10 21:03

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0020

Mitre link : CVE-2006-0020

CVE.ORG link : CVE-2006-0020


JSON object : View

Products Affected

microsoft

  • windows_me
  • windows_98
  • windows_xp
  • windows_98se
  • windows_2000
  • windows_2003_server
CWE
CWE-189

Numeric Errors