Executive Summary

Informations
Name MS06-043 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability in Microsoft Windows Could Allow Remote Code Execution (920214)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:441
 
Oval ID: oval:org.mitre.oval:def:441
Title: MHTML Parsing Vulnerability
Description: Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.
Family: windows Class: vulnerability
Reference(s): CVE-2006-2766
Version: 1
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Outlook Express
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 3

Open Source Vulnerability Database (OSVDB)

Id Description
25949 Microsoft Windows INETCOMM.DLL mhtml: URI Overflow

A remote overflow exists in Microsoft Windows. Microsoft Windows fails to perform proper boundary checks in inetcomm.dll when processing URLs with the "mhtml:" URI handler resulting in a stack-based buffer overflow. With a specially crafted request, an attacker can cause arbitrary remote code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Internet Explorer mhtml uri shortcut buffer overflow attempt
RuleID : 6510 - Revision : 15 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer mhtml uri href buffer overflow attempt
RuleID : 6509 - Revision : 16 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2006-08-08 Name : Arbitrary code can be executed on the remote host through the email client.
File : smb_nt_ms06-043.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:45:27
  • Multiple Updates
2014-01-19 21:30:00
  • Multiple Updates