Executive Summary

Name MS06-047 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score 5.1 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (921645)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:694
Oval ID: oval:org.mitre.oval:def:694
Title: Visual Basic for Applications Vulnerability
Description: Buffer overflow in Microsoft Visual Basic for Applications (VBA) SDK 6.0 through 6.4, as used by Microsoft Office 2000 SP3, Office XP SP3, Project 2000 SR1, Project 2002 SP1, Access 2000 Runtime SP3, Visio 2002 SP2, and Works Suite 2004 through 2006, allows user-assisted attackers to execute arbitrary code via unspecified document properties that are not verified when VBA is invoked to open documents.
Family: windows Class: vulnerability
Reference(s): CVE-2006-3649
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Visual Basic 6.0
Definition Synopsis:

CPE : Common Platform Enumeration

Application 4

Open Source Vulnerability Database (OSVDB)

Id Description
27849 Microsoft Visual Basic Unspecified Document Handling Overflow

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Visual Basic for Applications document properties overflow attempt
RuleID : 17286 - Revision : 14 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2006-08-08 Name : Arbitrary code can be executed on the remote host through VBA.
File : smb_nt_ms06-047.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2014-02-17 11:45:28
  • Multiple Updates