CVE-2006-4694

Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office XP and Office 2003 allows user-assisted attackers to execute arbitrary code via a crafted record in a PPT file, as exploited by malware such as Exploit:Win32/Controlppt.W, Exploit:Win32/Controlppt.X, and Exploit-PPT.d/Trojan.PPDropper.F. NOTE: it has been reported that the attack vector involves SlideShowWindows.View.GotoNamedShow.
References
Link Resource
http://secunia.com/advisories/22127 Vendor Advisory
http://securitytracker.com/id?1016937
http://vil.nai.com/vil/content/v_140666.htm
http://www.avertlabs.com/research/blog/?p=95
http://www.kb.cert.org/vuls/id/231204 US Government Resource
http://www.microsoft.com/technet/security/advisory/925984.mspx
http://www.osvdb.org/29259
http://www.securityfocus.com/archive/1/447831/100/0/threaded
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/20226
http://www.us-cert.gov/cas/techalerts/TA06-283A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3794 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058
https://exchange.xforce.ibmcloud.com/vulnerabilities/29225
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A269
http://secunia.com/advisories/22127 Vendor Advisory
http://securitytracker.com/id?1016937
http://vil.nai.com/vil/content/v_140666.htm
http://www.avertlabs.com/research/blog/?p=95
http://www.kb.cert.org/vuls/id/231204 US Government Resource
http://www.microsoft.com/technet/security/advisory/925984.mspx
http://www.osvdb.org/29259
http://www.securityfocus.com/archive/1/447831/100/0/threaded
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/20226
http://www.us-cert.gov/cas/techalerts/TA06-283A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3794 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058
https://exchange.xforce.ibmcloud.com/vulnerabilities/29225
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A269
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://secunia.com/advisories/22127 - Vendor Advisory () http://secunia.com/advisories/22127 - Vendor Advisory
References () http://securitytracker.com/id?1016937 - () http://securitytracker.com/id?1016937 -
References () http://vil.nai.com/vil/content/v_140666.htm - () http://vil.nai.com/vil/content/v_140666.htm -
References () http://www.avertlabs.com/research/blog/?p=95 - () http://www.avertlabs.com/research/blog/?p=95 -
References () http://www.kb.cert.org/vuls/id/231204 - US Government Resource () http://www.kb.cert.org/vuls/id/231204 - US Government Resource
References () http://www.microsoft.com/technet/security/advisory/925984.mspx - () http://www.microsoft.com/technet/security/advisory/925984.mspx -
References () http://www.osvdb.org/29259 - () http://www.osvdb.org/29259 -
References () http://www.securityfocus.com/archive/1/447831/100/0/threaded - () http://www.securityfocus.com/archive/1/447831/100/0/threaded -
References () http://www.securityfocus.com/archive/1/449179/100/0/threaded - () http://www.securityfocus.com/archive/1/449179/100/0/threaded -
References () http://www.securityfocus.com/bid/20226 - () http://www.securityfocus.com/bid/20226 -
References () http://www.us-cert.gov/cas/techalerts/TA06-283A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-283A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/3794 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3794 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29225 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29225 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A269 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A269 -

Information

Published : 2006-09-27 19:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4694

Mitre link : CVE-2006-4694

CVE.ORG link : CVE-2006-4694


JSON object : View

Products Affected

microsoft

  • office
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')