CVE-2006-4704

Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka "WMI Object Broker Vulnerability."
References
Link Resource
http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx
http://research.eeye.com/html/alerts/zeroday/20061031.html
http://secunia.com/advisories/22603 Vendor Advisory
http://securitytracker.com/id?1017142
http://www.kb.cert.org/vuls/id/854856 US Government Resource
http://www.microsoft.com/technet/security/advisory/927709.mspx Vendor Advisory
http://www.securityfocus.com/archive/1/454201/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/20797
http://www.securityfocus.com/bid/20843 Exploit
http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4282 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-047.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-073
https://exchange.xforce.ibmcloud.com/vulnerabilities/29915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A288
http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx
http://research.eeye.com/html/alerts/zeroday/20061031.html
http://secunia.com/advisories/22603 Vendor Advisory
http://securitytracker.com/id?1017142
http://www.kb.cert.org/vuls/id/854856 US Government Resource
http://www.microsoft.com/technet/security/advisory/927709.mspx Vendor Advisory
http://www.securityfocus.com/archive/1/454201/100/0/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/archive/1/454969/100/200/threaded
http://www.securityfocus.com/bid/20797
http://www.securityfocus.com/bid/20843 Exploit
http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf
http://www.us-cert.gov/cas/techalerts/TA06-346A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4282 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-047.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-073
https://exchange.xforce.ibmcloud.com/vulnerabilities/29915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A288
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:visual_studio_.net:2005:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx - () http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx -
References () http://research.eeye.com/html/alerts/zeroday/20061031.html - () http://research.eeye.com/html/alerts/zeroday/20061031.html -
References () http://secunia.com/advisories/22603 - Vendor Advisory () http://secunia.com/advisories/22603 - Vendor Advisory
References () http://securitytracker.com/id?1017142 - () http://securitytracker.com/id?1017142 -
References () http://www.kb.cert.org/vuls/id/854856 - US Government Resource () http://www.kb.cert.org/vuls/id/854856 - US Government Resource
References () http://www.microsoft.com/technet/security/advisory/927709.mspx - Vendor Advisory () http://www.microsoft.com/technet/security/advisory/927709.mspx - Vendor Advisory
References () http://www.securityfocus.com/archive/1/454201/100/0/threaded - () http://www.securityfocus.com/archive/1/454201/100/0/threaded -
References () http://www.securityfocus.com/archive/1/454969/100/200/threaded - () http://www.securityfocus.com/archive/1/454969/100/200/threaded -
References () http://www.securityfocus.com/bid/20797 - () http://www.securityfocus.com/bid/20797 -
References () http://www.securityfocus.com/bid/20843 - Exploit () http://www.securityfocus.com/bid/20843 - Exploit
References () http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf - () http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf -
References () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-346A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/4282 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4282 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-06-047.html - () http://www.zerodayinitiative.com/advisories/ZDI-06-047.html -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-073 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-073 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29915 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29915 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A288 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A288 -

Information

Published : 2006-11-01 15:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4704

Mitre link : CVE-2006-4704

CVE.ORG link : CVE-2006-4704


JSON object : View

Products Affected

microsoft

  • visual_studio_.net