Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-5745 | First vendor Publication | 2006-11-06 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.6 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5745 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:104 | |||
Oval ID: | oval:org.mitre.oval:def:104 | ||
Title: | Microsoft XML Core Services Vulnerability | ||
Description: | Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-5745 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft XML Core Services |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
SAINT Exploits
Description | Link |
---|---|
Microsoft XMLHTTP ActiveX control setRequestHeader vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-07-03 | Internet Explorer XML Core Services HTTP Request Handling |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
30208 | Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Exec... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | XMLHTTP 4.0 ActiveX clsid unicode access RuleID : 8728 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer XMLHTTP 4.0 ActiveX clsid access RuleID : 8727 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | ActiveX clsid unicode access RuleID : 8406 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer ActiveX clsid access RuleID : 8405 - Revision : 13 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Core XML core services XMLHTTP control open method code execution a... RuleID : 16090 - Revision : 11 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-10-30 | Name : The remote Windows host contains unsupported XML parsers. File : ms_msxml_unsupported.nasl - Type : ACT_GATHER_INFO |
2006-11-14 | Name : Arbitrary code can be executed on the remote host through the web or email cl... File : smb_nt_ms06-071.nasl - Type : ACT_GATHER_INFO |
2006-10-10 | Name : Arbitrary code can be executed on the remote host through the web or email cl... File : smb_nt_ms06-061.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:19:04 |
|
2024-11-28 12:10:30 |
|
2021-05-04 12:04:49 |
|
2021-04-22 01:05:25 |
|
2020-05-23 13:16:47 |
|
2020-05-23 00:18:39 |
|
2018-10-13 00:22:35 |
|
2017-10-11 09:23:46 |
|
2017-07-20 09:23:59 |
|
2016-04-26 15:16:05 |
|
2014-02-17 10:37:47 |
|
2014-01-19 21:23:38 |
|
2013-05-11 11:13:27 |
|