Vulnerability Name: | CVE-2006-3086 (CCN-27224) | ||||||||
Assigned: | 2006-06-18 | ||||||||
Published: | 2006-06-18 | ||||||||
Updated: | 2018-10-18 | ||||||||
Summary: | Stack-based buffer overflow in the HrShellOpenWithMonikerDisplayName function in Microsoft Hyperlink Object Library (hlink.dll) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long hyperlink, as demonstrated using an Excel worksheet with a long link in Unicode, aka "Hyperlink COM Object Buffer Overflow Vulnerability." Note: this is a different issue than CVE-2006-3059. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Full-disclosure Mailing List, Sat Jun 18 2005 - 15:50:59 CDT ***ULTRALAME*** Microsoft Excel Unicode Overflow ***ULTRALAME*** Source: CCN Type: Microsoft Security Response Center Blog Tuesday, June 20, 2006 11:17 Information on Proof of Concept posting about hlink.dll Source: MISC Type: UNKNOWN http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx Source: MITRE Type: CNA CVE-2006-3086 Source: FULLDISC Type: UNKNOWN 20060618 ***ULTRALAME*** Microsoft Excel Unicode Overflow Source: CCN Type: SA20748 Microsoft Windows Hyperlink Object Library Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 20748 Source: CCN Type: SECTRACK ID: 1016339 Microsoft Windows `hlink.dll` Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch 1016339 Source: CCN Type: ASA-2006-154 Windows Security Updates for August 2006 - (MS06-040 - MS06-051) Source: CCN Type: US-CERT VU#394444 Microsoft Hyperlink Object Library stack buffer overflow Source: CERT-VN Type: US Government Resource VU#394444 Source: CCN Type: Microsoft Security Bulletin MS06-050 Vulnerability in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670) Source: OSVDB Type: UNKNOWN 26666 Source: CCN Type: OSVDB ID: 26666 Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow Source: BUGTRAQ Type: UNKNOWN 20060622 MS Excel Remote Code Execution POC Exploit Source: BUGTRAQ Type: UNKNOWN 20060622 RE: MS Excel Remote Code Execution POC Exploit Source: BUGTRAQ Type: UNKNOWN 20060622 Re: MS Excel Remote Code Execution POC Exploit Source: BUGTRAQ Type: UNKNOWN 20060623 Re: Re: MS Excel Remote Code Execution POC Exploit Source: BUGTRAQ Type: UNKNOWN 20060623 Re: MS Excel Remote Code Execution POC Exploit Source: BUGTRAQ Type: UNKNOWN 20060808 TSRT-06-10: Microsoft HLINK.DLL Hyperlink Object Library Buffer Overflow Vulnerability Source: BID Type: Exploit 18500 Source: CCN Type: BID-18500 Microsoft HLINK.DLL Link Memory Corruption Vulnerability Source: CCN Type: TSRT-06-10 Microsoft HLINK.DLL Hyperlink Object Library Buffer Overflow Vulnerability Source: MISC Type: Patch, Vendor Advisory http://www.tippingpoint.com/security/advisories/TSRT-06-10.html Source: CCN Type: US-CERT Technical Cyber Security Alert TA06-220A Microsoft Windows, Office, and Internet Explorer Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2006-2431 Source: MS Type: UNKNOWN MS06-050 Source: XF Type: UNKNOWN excel-hlink-bo(27224) Source: XF Type: UNKNOWN excel-hlink-bo(27224) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:999 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |