9.3
CVSSv2

CVE-2006-4868

Published: 19/09/2006 Updated: 23/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 945
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote malicious users to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft outlook 2003

microsoft internet_explorer 6.0

microsoft internet_explorer 5.0.1

Exploits

#!/usr/bin/perl # # Microsoft Internet Explorer VML Remote Buffer Overflow (Windows XP SP2) # # Author: Trirat Puttaraksa (Kira) <trir00t [at] gmailcom> # # Credits: Niega # # [UPDATE Sep 24] # At the first time, I decide to release this exploit on Oct 10 # However, if u see this exploit before Oct 10, it is because of one # of the followin ...
<!-- ::[ jamikazu presents ]:: Microsoft Internet Explorer VML Remote Buffer Overflow Exploit (0day) Works on all Windows XP versions including SP2 Author: jamikazu Mail: jamikazu@gmailcom Credit: metasploit, SkyLined invokes calcexe if successful --> <html xmlns:v="urn:schemas-microsoft-com:vml"> <head> <objec ...
## # $Id: ms06_055_vml_methodrb 9669 2010-07-03 03:13:45Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' cl ...

Github Repositories

Exploit code

Exploits and Shellcode Exploit code by year/CVE 2006/CVE-2006-4868/vmlDoShtml 2007/CVE-2007-0816/catirpcdosrb 2007/CVE-2007-1785/camediasvrremotepy 2007/CVE-2007-2772/caloggerdospy 2007/CVE-2007-2772/camediasvrdospy Shellcode (by OS)