CVE-2006-4868 (GCVE-0-2006-4868)
Vulnerability from cvelistv5
Published
2006-09-19 19:00
Modified
2024-08-07 19:32
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.
References
http://blogs.securiteam.com/index.php/archives/624 x_refsource_MISC
http://www.securityfocus.com/archive/1/446881/100/200/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/20096 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/446523/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/446505/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3679 vdb-entry, x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/416092 third-party-advisory, x_refsource_CERT-VN
http://www.microsoft.com/technet/security/advisory/925568.mspx x_refsource_CONFIRM
http://support.microsoft.com/kb/925486 vendor-advisory, x_refsource_MSKB
http://secunia.com/advisories/21989 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/448552/100/0/threaded vendor-advisory, x_refsource_HP
http://www.securityfocus.com/archive/1/448552/100/0/threaded vendor-advisory, x_refsource_HP
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055 vendor-advisory, x_refsource_MS
http://www.us-cert.gov/cas/techalerts/TA06-262A.html third-party-advisory, x_refsource_CERT
http://www.securityfocus.com/archive/1/446528/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/28946 vdb-entry, x_refsource_OSVDB
http://securitytracker.com/id?1016879 vdb-entry, x_refsource_SECTRACK
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html x_refsource_MISC
http://www.securityfocus.com/archive/1/447070/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/446378/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100 vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/29004 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:32:21.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blogs.securiteam.com/index.php/archives/624"
          },
          {
            "name": "20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/446881/100/200/threaded"
          },
          {
            "name": "20096",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20096"
          },
          {
            "name": "20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/446523/100/0/threaded"
          },
          {
            "name": "20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/446505/100/0/threaded"
          },
          {
            "name": "ADV-2006-3679",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3679"
          },
          {
            "name": "VU#416092",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/416092"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.microsoft.com/technet/security/advisory/925568.mspx"
          },
          {
            "name": "925486",
            "tags": [
              "vendor-advisory",
              "x_refsource_MSKB",
              "x_transferred"
            ],
            "url": "http://support.microsoft.com/kb/925486"
          },
          {
            "name": "21989",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21989"
          },
          {
            "name": "SSRT061254",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
          },
          {
            "name": "HPSBST02160",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
          },
          {
            "name": "MS06-055",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055"
          },
          {
            "name": "TA06-262A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-262A.html"
          },
          {
            "name": "20060920 Internet Explorer VML Zero-Day Mitigation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/446528/100/0/threaded"
          },
          {
            "name": "28946",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28946"
          },
          {
            "name": "1016879",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016879"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html"
          },
          {
            "name": "20060926 Windows VML security update MS06-055 released",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447070/100/0/threaded"
          },
          {
            "name": "20060919 Yet another 0day for IE",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/446378/100/0/threaded"
          },
          {
            "name": "oval:org.mitre.oval:def:100",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100"
          },
          {
            "name": "ie-vml-bo(29004)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blogs.securiteam.com/index.php/archives/624"
        },
        {
          "name": "20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/446881/100/200/threaded"
        },
        {
          "name": "20096",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20096"
        },
        {
          "name": "20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/446523/100/0/threaded"
        },
        {
          "name": "20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/446505/100/0/threaded"
        },
        {
          "name": "ADV-2006-3679",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3679"
        },
        {
          "name": "VU#416092",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/416092"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.microsoft.com/technet/security/advisory/925568.mspx"
        },
        {
          "name": "925486",
          "tags": [
            "vendor-advisory",
            "x_refsource_MSKB"
          ],
          "url": "http://support.microsoft.com/kb/925486"
        },
        {
          "name": "21989",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21989"
        },
        {
          "name": "SSRT061254",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
        },
        {
          "name": "HPSBST02160",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
        },
        {
          "name": "MS06-055",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055"
        },
        {
          "name": "TA06-262A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-262A.html"
        },
        {
          "name": "20060920 Internet Explorer VML Zero-Day Mitigation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/446528/100/0/threaded"
        },
        {
          "name": "28946",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28946"
        },
        {
          "name": "1016879",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016879"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html"
        },
        {
          "name": "20060926 Windows VML security update MS06-055 released",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447070/100/0/threaded"
        },
        {
          "name": "20060919 Yet another 0day for IE",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/446378/100/0/threaded"
        },
        {
          "name": "oval:org.mitre.oval:def:100",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100"
        },
        {
          "name": "ie-vml-bo(29004)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4868",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blogs.securiteam.com/index.php/archives/624",
              "refsource": "MISC",
              "url": "http://blogs.securiteam.com/index.php/archives/624"
            },
            {
              "name": "20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/446881/100/200/threaded"
            },
            {
              "name": "20096",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20096"
            },
            {
              "name": "20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/446523/100/0/threaded"
            },
            {
              "name": "20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/446505/100/0/threaded"
            },
            {
              "name": "ADV-2006-3679",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3679"
            },
            {
              "name": "VU#416092",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/416092"
            },
            {
              "name": "http://www.microsoft.com/technet/security/advisory/925568.mspx",
              "refsource": "CONFIRM",
              "url": "http://www.microsoft.com/technet/security/advisory/925568.mspx"
            },
            {
              "name": "925486",
              "refsource": "MSKB",
              "url": "http://support.microsoft.com/kb/925486"
            },
            {
              "name": "21989",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21989"
            },
            {
              "name": "SSRT061254",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
            },
            {
              "name": "HPSBST02160",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/448552/100/0/threaded"
            },
            {
              "name": "MS06-055",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-055"
            },
            {
              "name": "TA06-262A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-262A.html"
            },
            {
              "name": "20060920 Internet Explorer VML Zero-Day Mitigation",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/446528/100/0/threaded"
            },
            {
              "name": "28946",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28946"
            },
            {
              "name": "1016879",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016879"
            },
            {
              "name": "http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html",
              "refsource": "MISC",
              "url": "http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html"
            },
            {
              "name": "20060926 Windows VML security update MS06-055 released",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447070/100/0/threaded"
            },
            {
              "name": "20060919 Yet another 0day for IE",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/446378/100/0/threaded"
            },
            {
              "name": "oval:org.mitre.oval:def:100",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100"
            },
            {
              "name": "ie-vml-bo(29004)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4868",
    "datePublished": "2006-09-19T19:00:00.000Z",
    "dateReserved": "2006-09-19T00:00:00.000Z",
    "dateUpdated": "2024-08-07T19:32:21.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…