Vulnerability Name:

CVE-2006-0013 (CCN-24491)

Assigned:2005-11-09
Published:2006-02-14
Updated:2018-10-12
Summary:Buffer overflow in the Web Client service (WebClnt.dll) for Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote authenticated users or Guests to execute arbitrary code via crafted RPC requests, a different vulnerability than CVE-2005-1207.
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-0013

Source: CCN
Type: SA18857
Microsoft Windows Web Client Service Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
18857

Source: CCN
Type: SECTRACK ID: 1015630
Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1015630

Source: CCN
Type: ASA-2006-047
Windows Security Updates for February 2006 - (MS06-004 to MS06-010)

Source: CCN
Type: US-CERT VU#388900
Microsoft Web Client Service vulnerable to buffer overflow

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#388900

Source: CCN
Type: Microsoft Security Bulletin MS06-008
Vulnerability in Web Client Service Could Allow Remote Code Execution (911927)

Source: BID
Type: Patch
16636

Source: CCN
Type: BID-16636
Microsoft Windows Web Client Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-0577

Source: MS
Type: UNKNOWN
MS06-008

Source: XF
Type: UNKNOWN
msrpc-webclient-message-bo(24491)

Source: XF
Type: UNKNOWN
msrpc-webclient-message-bo(24491)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1220

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1547

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1602

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:683

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:716

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~~~itanium~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_2003:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:683
    V
    WebClient Service Unchecked Buffer Remote Code Execution (XP,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1602
    V
    WebClient Service Unchecked Buffer Remote Code Execution (XP,SP2)
    2011-05-16
    oval:org.mitre.oval:def:716
    V
    WebClient Service Unchecked Buffer Remote Code Execution (64-bit XP,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1220
    V
    WebClient Service Unchecked Buffer Remote Code Execution (Server 2003,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1547
    V
    WebClient Service Unchecked Buffer Remote Code Execution (Server 2003)
    2011-05-16
    BACK
    microsoft windows 2003 server datacenter_64-bit sp1
    microsoft windows 2003 server enterprise
    microsoft windows 2003 server enterprise sp1
    microsoft windows 2003 server enterprise_64-bit
    microsoft windows 2003 server enterprise_64-bit sp1
    microsoft windows 2003 server r2
    microsoft windows 2003 server r2
    microsoft windows 2003 server r2 sp1
    microsoft windows 2003 server standard
    microsoft windows 2003 server standard sp1
    microsoft windows 2003 server standard_64-bit
    microsoft windows 2003 server web
    microsoft windows 2003 server web sp1
    microsoft windows xp *
    microsoft windows xp *
    microsoft windows xp * gold
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows xp - sp1
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003 server -
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows 2003 *