Vulnerability Name:

CVE-2006-4692 (CCN-29205)

Assigned:2006-10-10
Published:2006-10-10
Updated:2018-10-17
Summary:Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-4692

Source: CCN
Type: SA20717
Microsoft Windows Object Packager Dialog Spoofing Vulnerability

Source: SECUNIA
Type: Vendor Advisory
20717

Source: MISC
Type: Vendor Advisory
http://secunia.com/secunia_research/2006-54/advisory/

Source: CCN
Type: SECTRACK ID: 1017037
Windows Object Packager RTF File Object Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017037

Source: CCN
Type: ASA-2006-217
Windows Security Updates for October 2006 - (MS06-056 - MS06-065)

Source: CCN
Type: US-CERT VU#703936
Microsoft Object Packager fails to properly display file types

Source: CERT-VN
Type: US Government Resource
VU#703936

Source: CCN
Type: Microsoft Security Bulletin MS06-065
Vulnerability in Windows Object Packager Could Allow Remote Execution (924496)

Source: OSVDB
Type: UNKNOWN
29424

Source: CCN
Type: OSVDB ID: 29424
Microsoft Windows Object Packager File Extension Dialog Spoofing

Source: BUGTRAQ
Type: UNKNOWN
20061011 Secunia Research: Microsoft Windows Object Packager Dialog Spoofing

Source: BUGTRAQ
Type: UNKNOWN
20061014 Re: Secunia Research: Microsoft Windows Object Packager Dialog Spoofing

Source: HP
Type: UNKNOWN
SSRT061264

Source: BID
Type: UNKNOWN
20318

Source: CCN
Type: BID-20318
Microsoft Windows Object Packager Remote Code Execution Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-3984

Source: MS
Type: UNKNOWN
MS06-065

Source: XF
Type: UNKNOWN
win-object-pkg-code-execution(29205)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:496

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~~~itanium~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_2003:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:496
    V
    Object Packager Dialogue Spoofing Vulnerability
    2011-05-09
    BACK
    microsoft windows 2003 server sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows xp - sp1
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003 server -
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows 2003 *