Executive Summary

Informations
Name CVE-2006-0002 First vendor Publication 2006-01-10
Vendor Cve Last vendor Modification 2020-04-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0002

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1082
 
Oval ID: oval:org.mitre.oval:def:1082
Title: Exchange 2000 Server TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 1
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1165
 
Oval ID: oval:org.mitre.oval:def:1165
Title: Outlook 2002 TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 10
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1316
 
Oval ID: oval:org.mitre.oval:def:1316
Title: Exchange Server 5.0 TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 1
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1456
 
Oval ID: oval:org.mitre.oval:def:1456
Title: Outlook 2003 TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 9
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1485
 
Oval ID: oval:org.mitre.oval:def:1485
Title: Outlook 2000 TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 8
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:624
 
Oval ID: oval:org.mitre.oval:def:624
Title: Exchange Server 5.5 TNEF Decoding Vulnerability
Description: Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Family: windows Class: vulnerability
Reference(s): CVE-2006-0002
Version: 2
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9
Application 4
Application 3

Open Source Vulnerability Database (OSVDB)

Id Description
22305 Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution

Microsoft Outlook and Exchange contain a flaw that may allow arbitrary code execution. The issue is due to the servers not properly sanitizing input via e-mail messages. By sending an e-mail with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, a user who views (opens or previews) the e-mail will execute custom code sent by an attacker.

Information Assurance Vulnerability Management (IAVM)

Date Description
2006-01-12 IAVM : 2006-A-0003 - Microsoft Outlook and Exchange TNEF Decoding Vulnerability
Severity : Category I - VMSKEY : V0011719

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows Exchange and Outlook TNEF Decoding Integer Overflow attempt
RuleID : 17481 - Revision : 14 - Type : SERVER-MAIL

Nessus® Vulnerability Scanner

Date Description
2006-01-10 Name : Arbitrary code can be executed on the remote host through the email client or...
File : smb_nt_ms06-003.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/16197
BUGTRAQ http://www.securityfocus.com/archive/1/421518/100/0/threaded
http://www.securityfocus.com/archive/1/421520/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA06-010A.html
CERT-VN http://www.kb.cert.org/vuls/id/252146
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2006-004.htm
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1015460
http://securitytracker.com/id?1015461
SECUNIA http://secunia.com/advisories/18368
SREASON http://securityreason.com/securityalert/330
http://securityreason.com/securityalert/331
VUPEN http://www.vupen.com/english/advisories/2006/0119
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/22878

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2021-05-04 12:04:10
  • Multiple Updates
2021-04-22 01:04:47
  • Multiple Updates
2020-05-23 00:17:16
  • Multiple Updates
2018-10-19 21:19:43
  • Multiple Updates
2018-10-13 00:22:32
  • Multiple Updates
2017-10-11 09:23:36
  • Multiple Updates
2017-07-11 12:02:08
  • Multiple Updates
2016-04-26 14:10:38
  • Multiple Updates
2014-02-17 10:34:11
  • Multiple Updates
2014-01-19 21:23:01
  • Multiple Updates
2013-11-11 12:37:36
  • Multiple Updates
2013-05-11 10:45:52
  • Multiple Updates