CVE-2006-1510

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:.net_framework:1.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.0:sp1:sdk:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.1:sp1:sdk:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html - Exploit, Patch, Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html - Exploit, Patch, Vendor Advisory
References () http://owasp.net/forums/234/showpost.aspx - Exploit, Patch () http://owasp.net/forums/234/showpost.aspx - Exploit, Patch
References () http://owasp.net/forums/257/showpost.aspx - Exploit () http://owasp.net/forums/257/showpost.aspx - Exploit
References () http://secunia.com/advisories/19406 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/19406 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/17243 - Exploit, Patch () http://www.securityfocus.com/bid/17243 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2006/1113 - () http://www.vupen.com/english/advisories/2006/1113 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25439 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25439 -

Information

Published : 2006-03-30 01:06

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1510

Mitre link : CVE-2006-1510

CVE.ORG link : CVE-2006-1510


JSON object : View

Products Affected

microsoft

  • .net_framework