Heap-based buffer overflow in Windows Live Messenger 8.0 allows user-assisted attackers to execute arbitrary code via a crafted Contact List (.ctt) file, which triggers the overflow when it is imported by the user.
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitydot.net/xpl/exploits/vulnerabilities/articles/1108/exploit.html - | |
References | () http://securitytracker.com/id?1016373 - Exploit | |
References | () http://www.jaascois.com/exploits/18602016/ - Exploit, URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/438442/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18639 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27417 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.jaascois.com/exploits/18602016/ - Exploit, URL Repurposed |
Information
Published : 2006-06-27 18:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3250
Mitre link : CVE-2006-3250
CVE.ORG link : CVE-2006-3250
JSON object : View
Products Affected
microsoft
- windows_live_messenger
CWE