Executive Summary

Informations
Name CVE-2006-2056 First vendor Publication 2006-04-26
Vendor Cve Last vendor Modification 2024-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Argument injection vulnerability in Internet Explorer 6 for Windows XP SP2 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2056

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-88 OS Command Injection
CAPEC-133 Try All Common Application Switches and Options

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-88 Argument Injection or Modification

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
31331 Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification

Sources (Detail)

Source Url
BUGTRAQ http://www.securityfocus.com/archive/1/432009/100/0/threaded
MISC http://ingehenriksen.blogspot.com/2006/04/office-2003-file-attachment-exploit...
VUPEN http://www.vupen.com/english/advisories/2006/1538
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/26118

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2024-02-13 21:27:57
  • Multiple Updates
2021-05-04 12:03:58
  • Multiple Updates
2021-04-22 01:04:31
  • Multiple Updates
2020-05-23 00:17:43
  • Multiple Updates
2018-10-18 21:20:06
  • Multiple Updates
2017-07-20 09:23:32
  • Multiple Updates
2013-05-11 10:55:36
  • Multiple Updates