5.1
CVSSv2

CVE-2006-0009

Published: 14/03/2006 Updated: 07/11/2023
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted malicious users to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft works 2006

microsoft office 2003

microsoft office 2004

microsoft office xp

microsoft works 2001

microsoft works 2000

microsoft works 2002

microsoft works 2005

microsoft works 2003

microsoft office v.x

microsoft works 2004

microsoft office 2000

References

NVD-CWE-Otherhttp://www.kb.cert.org/vuls/id/682820http://securitytracker.com/id?1015766http://secunia.com/advisories/19138http://www.us-cert.gov/cas/techalerts/TA06-073A.htmlhttp://www.securityfocus.com/bid/17000http://www.symantec.com/enterprise/research/SYMSA-2006-001.txthttp://www.osvdb.org/23903http://support.avaya.com/elmodocs2/security/ASA-2006-069.htmhttp://secunia.com/advisories/19238http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0597.htmlhttp://isc.sans.org/diary.php?storyid=1618http://blogs.securiteam.com/?p=557http://blogs.securiteam.com/?p=559http://www.darkreading.com/document.asp?doc_id=101970http://securitytracker.com/id?1016720http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049540.htmlhttp://blogs.securiteam.com/?author=28http://www.symantec.com/security_response/writeup.jsp?docid=2006-091810-5028-99http://www.securityfocus.com/bid/20059http://securitytracker.com/id?1016886http://www.vupen.com/english/advisories/2006/0950http://www.vupen.com/english/advisories/2006/3678https://exchange.xforce.ibmcloud.com/vulnerabilities/29009https://exchange.xforce.ibmcloud.com/vulnerabilities/25009https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A798https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1653https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1553https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1504https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012http://www.securityfocus.com/archive/1/446425/100/0/threadedhttp://www.securityfocus.com/archive/1/446370/100/0/threadedhttp://www.securityfocus.com/archive/1/444051/100/200/threadedhttp://www.securityfocus.com/archive/1/443890/100/0/threadedhttp://www.securityfocus.com/archive/1/432004/30/5340/threadedhttp://www.securityfocus.com/archive/1/427671/100/0/threadedhttp://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_MDROPPER.BHhttps://nvd.nist.govhttps://www.kb.cert.org/vuls/id/682820