Vulnerability Name:

CVE-2006-1510 (CCN-25439)

Assigned:2006-03-27
Published:2006-03-27
Updated:2017-07-20
Summary:Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Succesful exploitation can only occur when ntdll.dll system library is used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK packages.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Sun Mar 26 2006 - 18:53:24 CST
Buffer OverFlow in ILASM and ILDASM

Source: MITRE
Type: CNA
CVE-2006-1510

Source: FULLDISC
Type: Exploit, Patch, Vendor Advisory
20060327 Buffer OverFlow in ILASM and ILDASM

Source: CCN
Type: Microsoft .NET Framework Developer Center
SDKs, Redistributables & Service Packs

Source: MISC
Type: Exploit, Patch
http://owasp.net/forums/234/showpost.aspx

Source: MISC
Type: Exploit
http://owasp.net/forums/257/showpost.aspx

Source: CCN
Type: SA19406
Microsoft .NET Framework SDK ildasm Buffer Overflow

Source: SECUNIA
Type: Exploit, Patch, Vendor Advisory
19406

Source: CCN
Type: OSVDB ID: 24208
Microsoft .NET Framework ILDASM Overflow

Source: BID
Type: Exploit, Patch
17243

Source: CCN
Type: BID-17243
Microsoft .NET Framework SDK MSIL Tools Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-1113

Source: XF
Type: UNKNOWN
ms-dotnet-ildasm-bo(25439)

Source: XF
Type: UNKNOWN
ms-dotnet-ildasm-bo(25439)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:.net_framework:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.0:sp1:sdk:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.1:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.1:sp1:sdk:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:.net_framework:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.1:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft .net framework 1.0
    microsoft .net framework 1.0 sp1
    microsoft .net framework 1.0 sp2
    microsoft .net framework 1.1
    microsoft .net framework 1.1 sp1
    microsoft .net framework 1.0
    microsoft .net framework 1.1
    microsoft .net framework 1.1 sp1