CVE-2006-0020
An unspecified Microsoft WMF parsing application, as used in Internet Explorer 5.01 SP4 on Windows 2000 SP4, and 5.5 SP2 on Windows Millennium, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute code via a crafted WMF file with a manipulated WMF header size, possibly involving an integer overflow, a different vulnerability than CVE-2005-4560, and aka "WMF Image Parsing Memory Corruption Vulnerability."
Published
2006-01-10T21:03:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 9.3 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://linuxbox.org/pipermail/funsec/2006-January/002828.html
Exploit, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18729
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18912
Vendor Advisory
([email protected])
-
http://www.kb.cert.org/vuls/id/312956
Patch, Third Party Advisory, US Government Resource
([email protected])
-
http://www.microsoft.com/technet/security/advisory/913333.mspx
Vendor Advisory
([email protected])
-
http://www.osvdb.org/22976
([email protected])
-
http://www.securityfocus.com/bid/16516
Patch
([email protected])
-
http://www.us-cert.gov/cas/techalerts/TA06-045A.html
Third Party Advisory, US Government Resource
([email protected])
-
http://www.vupen.com/english/advisories/2006/0469
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638
([email protected])
-
http://linuxbox.org/pipermail/funsec/2006-January/002828.html
Exploit, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18729
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18912
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/312956
Patch, Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.microsoft.com/technet/security/advisory/913333.mspx
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/22976
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/16516
Patch
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/cas/techalerts/TA06-045A.html
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/0469
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1638
(af854a3a-2127-422b-91ae-364da2661108)