Vulnerability Name: | CVE-2006-0564 (CCN-24481) | ||||||||
Assigned: | 2006-02-06 | ||||||||
Published: | 2006-02-06 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | Stack-based buffer overflow in Microsoft HTML Help Workshop 4.74.8702.0, and possibly earlier versions, and as included in the Microsoft HTML Help 1.4 SDK, allows context-dependent attackers to execute arbitrary code via a .hhp file with a long Contents file field. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-0564 Source: CCN Type: SA18740 Microsoft HTML Help Workshop ".hhp" Parsing Buffer Overflow Source: SECUNIA Type: Vendor Advisory 18740 Source: CCN Type: SECTRACK ID: 1015585 Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015585 Source: CCN Type: bratax.be Security Advisory B008 Microsoft HTML Help Workshop .hhp File Processing Buffer Overflow Lets Remote User Execute Arbitrary Code Source: MISC Type: UNKNOWN http://users.pandora.be/bratax/advisories/b008.html Source: CCN Type: US-CERT VU#124460 Microsoft HTML Help Workshop buffer overflow Source: CERT-VN Type: US Government Resource VU#124460 Source: CCN Type: Microsoft Corporation Web site HTML Help Workshop and Documentation Source: OSVDB Type: UNKNOWN 22941 Source: CCN Type: OSVDB ID: 22941 Microsoft HTML Help Workshop .hhp Parsing Overflow Source: VUPEN Type: UNKNOWN ADV-2006-0446 Source: XF Type: UNKNOWN mshtmlhelp-workshop-hhp-bo(24481) Source: XF Type: UNKNOWN mshtmlhelp-workshop-hhp-bo(24481) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |