Mathcad 12 through 13.1 allows local users to bypass the security features by directly accessing or editing the XML representation of the worksheet with a text editor or other program, which allows attackers to (1) bypass password protection by replacing the password field with a hash of a known password, (2) modify timestamps to avoid detection of modifications, (3) remove locks by removing the "is-locked" attribute, and (4) view locked data, which is stored in plaintext.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2305 - | |
References | () http://www.securityfocus.com/archive/1/436441/30/4560/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27115 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27116 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27117 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27118 - |
Information
Published : 2007-02-23 03:28
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7037
Mitre link : CVE-2006-7037
CVE.ORG link : CVE-2006-7037
JSON object : View
Products Affected
microsoft
- windows_me
- windows_98
- windows_95
- windows_nt
- windows_xp
- windows_98se
- windows_2000
- windows_2003_server
mathsoft
- mathcad
CWE