CVE-2006-6696

Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (CSRSS) process, which is not properly handled when invoking the UserHardError and GetHardErrorText functions in WINSRV.DLL.
References
Link Resource
http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx
http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff
http://isc.sans.org/diary.php?n&storyid=1965
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html
http://research.eeye.com/html/alerts/zeroday/20061215.html
http://secunia.com/advisories/23448 Vendor Advisory
http://securitytracker.com/id?1017433
http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html
http://www.kuban.ru/forum_new/forum2/files/19124.html
http://www.security.nnov.ru/Gnews944.html
http://www.security.nnov.ru/files/messagebox.c
http://www.securityfocus.com/archive/1/455061/100/0/threaded
http://www.securityfocus.com/archive/1/455088/100/0/threaded
http://www.securityfocus.com/archive/1/455104/100/0/threaded
http://www.securityfocus.com/archive/1/455158/100/0/threaded
http://www.securityfocus.com/archive/1/455546/100/0/threaded
http://www.securityfocus.com/archive/1/466331/100/200/threaded
http://www.securityfocus.com/archive/1/466331/100/200/threaded
http://www.securityfocus.com/bid/21688
http://www.securityfocus.com/bid/23324
http://www.vupen.com/english/advisories/2006/5120
http://www.vupen.com/english/advisories/2007/1325
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816
http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx
http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff
http://isc.sans.org/diary.php?n&storyid=1965
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html
http://research.eeye.com/html/alerts/zeroday/20061215.html
http://secunia.com/advisories/23448 Vendor Advisory
http://securitytracker.com/id?1017433
http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html
http://www.kuban.ru/forum_new/forum2/files/19124.html
http://www.security.nnov.ru/Gnews944.html
http://www.security.nnov.ru/files/messagebox.c
http://www.securityfocus.com/archive/1/455061/100/0/threaded
http://www.securityfocus.com/archive/1/455088/100/0/threaded
http://www.securityfocus.com/archive/1/455104/100/0/threaded
http://www.securityfocus.com/archive/1/455158/100/0/threaded
http://www.securityfocus.com/archive/1/455546/100/0/threaded
http://www.securityfocus.com/archive/1/466331/100/200/threaded
http://www.securityfocus.com/archive/1/466331/100/200/threaded
http://www.securityfocus.com/bid/21688
http://www.securityfocus.com/bid/23324
http://www.vupen.com/english/advisories/2006/5120
http://www.vupen.com/english/advisories/2007/1325
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1_beta_1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1_beta_1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1_beta_1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:sp1_beta_1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:december_ctp:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx - () http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx -
References () http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff - () http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff -
References () http://isc.sans.org/diary.php?n&storyid=1965 - () http://isc.sans.org/diary.php?n&storyid=1965 -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html -
References () http://research.eeye.com/html/alerts/zeroday/20061215.html - () http://research.eeye.com/html/alerts/zeroday/20061215.html -
References () http://secunia.com/advisories/23448 - Vendor Advisory () http://secunia.com/advisories/23448 - Vendor Advisory
References () http://securitytracker.com/id?1017433 - () http://securitytracker.com/id?1017433 -
References () http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html - () http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html -
References () http://www.kuban.ru/forum_new/forum2/files/19124.html - () http://www.kuban.ru/forum_new/forum2/files/19124.html -
References () http://www.security.nnov.ru/Gnews944.html - () http://www.security.nnov.ru/Gnews944.html -
References () http://www.security.nnov.ru/files/messagebox.c - () http://www.security.nnov.ru/files/messagebox.c -
References () http://www.securityfocus.com/archive/1/455061/100/0/threaded - () http://www.securityfocus.com/archive/1/455061/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455088/100/0/threaded - () http://www.securityfocus.com/archive/1/455088/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455104/100/0/threaded - () http://www.securityfocus.com/archive/1/455104/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455158/100/0/threaded - () http://www.securityfocus.com/archive/1/455158/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455546/100/0/threaded - () http://www.securityfocus.com/archive/1/455546/100/0/threaded -
References () http://www.securityfocus.com/archive/1/466331/100/200/threaded - () http://www.securityfocus.com/archive/1/466331/100/200/threaded -
References () http://www.securityfocus.com/bid/21688 - () http://www.securityfocus.com/bid/21688 -
References () http://www.securityfocus.com/bid/23324 - () http://www.securityfocus.com/bid/23324 -
References () http://www.vupen.com/english/advisories/2006/5120 - () http://www.vupen.com/english/advisories/2006/5120 -
References () http://www.vupen.com/english/advisories/2007/1325 - () http://www.vupen.com/english/advisories/2007/1325 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816 -

Information

Published : 2006-12-22 02:28

Updated : 2024-11-21 00:23


NVD link : CVE-2006-6696

Mitre link : CVE-2006-6696

CVE.ORG link : CVE-2006-6696


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_2000
  • windows_xp
  • windows_2003_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer