Vulnerability Name: | CVE-2006-4692 (CCN-29205) | ||||||||
Assigned: | 2006-10-10 | ||||||||
Published: | 2006-10-10 | ||||||||
Updated: | 2018-10-17 | ||||||||
Summary: | Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability." | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-4692 Source: CCN Type: SA20717 Microsoft Windows Object Packager Dialog Spoofing Vulnerability Source: SECUNIA Type: Vendor Advisory 20717 Source: MISC Type: Vendor Advisory http://secunia.com/secunia_research/2006-54/advisory/ Source: CCN Type: SECTRACK ID: 1017037 Windows Object Packager RTF File Object Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1017037 Source: CCN Type: ASA-2006-217 Windows Security Updates for October 2006 - (MS06-056 - MS06-065) Source: CCN Type: US-CERT VU#703936 Microsoft Object Packager fails to properly display file types Source: CERT-VN Type: US Government Resource VU#703936 Source: CCN Type: Microsoft Security Bulletin MS06-065 Vulnerability in Windows Object Packager Could Allow Remote Execution (924496) Source: OSVDB Type: UNKNOWN 29424 Source: CCN Type: OSVDB ID: 29424 Microsoft Windows Object Packager File Extension Dialog Spoofing Source: BUGTRAQ Type: UNKNOWN 20061011 Secunia Research: Microsoft Windows Object Packager Dialog Spoofing Source: BUGTRAQ Type: UNKNOWN 20061014 Re: Secunia Research: Microsoft Windows Object Packager Dialog Spoofing Source: HP Type: UNKNOWN SSRT061264 Source: BID Type: UNKNOWN 20318 Source: CCN Type: BID-20318 Microsoft Windows Object Packager Remote Code Execution Vulnerability Source: VUPEN Type: Vendor Advisory ADV-2006-3984 Source: MS Type: UNKNOWN MS06-065 Source: XF Type: UNKNOWN win-object-pkg-code-execution(29205) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:496 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |