Vulnerability Name:

CVE-2006-4868 (CCN-29004)

Assigned:2006-09-19
Published:2006-09-19
Updated:2021-07-23
Summary:Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Wed Sep 20 2006 - 13:03:01 CDT
vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit

Source: MISC
Type: UNKNOWN
http://blogs.securiteam.com/index.php/archives/624

Source: MITRE
Type: CNA
CVE-2006-4868

Source: CCN
Type: Microsoft.com
Introduction to Vector Markup Language (VML)

Source: CCN
Type: SA21989
Microsoft Vector Graphics Rendering Library Buffer Overflow

Source: SECUNIA
Type: Patch, Vendor Advisory
21989

Source: CCN
Type: SECTRACK ID: 1016879
Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016879

Source: MISC
Type: UNKNOWN
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html

Source: CCN
Type: ASA-2006-238
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (MS06-055)

Source: MSKB
Type: UNKNOWN
925486

Source: CCN
Type: Microsoft Security Bulletin MS11-096
Vulnerability in Microsoft Excel Could Allow Remote Code Execution (2640241)

Source: CCN
Type: Microsoft Security Bulletin MS12-028
Vulnerability in Microsoft Office Could Allow for Remote Code Execution (2639185)

Source: CCN
Type: Microsoft Security Bulletin MS12-029
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)

Source: CCN
Type: Microsoft Security Bulletin MS12-034
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)

Source: CCN
Type: Microsoft Security Bulletin MS12-057
Vulnerability in Microsoft Office Could Allow for Remote Code Execution (2731879)

Source: CCN
Type: Microsoft Security Bulletin MS12-064
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)

Source: CCN
Type: Microsoft Security Bulletin MS12-065
Vulnerability in Microsoft Works Could Allow Remote Code Execution (KB2754670)

Source: CCN
Type: Microsoft Security Bulletin MS12-070
Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)

Source: CCN
Type: Microsoft Security Bulletin MS12-079
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)

Source: CCN
Type: Microsoft Security Bulletin MS13-022
Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)

Source: CCN
Type: Microsoft Security Bulletin MS13-043
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2830399)

Source: CCN
Type: Microsoft Security Bulletin MS13-054
Vulnerability in Windows Components Could Allow Remote Code Execution (2848295)

Source: CCN
Type: Microsoft Security Bulletin MS13-072
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)

Source: CCN
Type: Microsoft Security Bulletin MS13-085
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)

Source: CCN
Type: Microsoft Security Bulletin MS13-086
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)

Source: CCN
Type: Microsoft Security Bulletin MS14-001
Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2916605)

Source: CCN
Type: Microsoft Security Bulletin MS14-017
Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2949660)

Source: CCN
Type: Microsoft Security Bulletin MS14-034
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261)

Source: CCN
Type: Microsoft Security Bulletin MS14-038
Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689)

Source: CCN
Type: Microsoft Security Bulletin MS14-044
Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340)

Source: CCN
Type: Microsoft Security Bulletin MS14-061
Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434)

Source: CCN
Type: Microsoft Security Bulletin MS14-069
Vulnerability in Microsoft Office Could Allow Remote Code Execution (3009710)

Source: CCN
Type: Microsoft Security Bulletin MS14-081
Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301)

Source: CCN
Type: Microsoft Security Bulletin MS14-083
Vulnerabilities in MicrosoftExcel Could Allow Remote Code Execution (3017347)

Source: CCN
Type: Microsoft Security Bulletin MS15-081
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3080790)

Source: CCN
Type: Microsoft Security Bulletin MS15-099
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3089664)

Source: CCN
Type: Microsoft Security Bulletin MS15-110
Security Updates for Microsoft Office (3096440)

Source: CCN
Type: Microsoft Security Bulletin MS15-116
Security Updates for Microsoft Office to Address Remote Code Execution (3104540)

Source: CCN
Type: Microsoft Security Bulletin MS15-131
Security Update for Microsoft Office to Address Remote Code Execution (3116111)

Source: CCN
Type: Microsoft Security Bulletin MS16-004
Security Update for Microsoft Office to Address Remote Code Execution - Critical (3124585)

Source: CCN
Type: Microsoft Security Bulletin MS16-015
Security Update for Microsoft Office to Address Remote Code Execution (3134226)

Source: CCN
Type: Microsoft Security Bulletin MS16-029
Security Update for Microsoft Office to Address Remote Code Execution (3141806)

Source: CCN
Type: Microsoft Security Bulletin MS16-042
Security Update for Microsoft Office (3148775)

Source: CCN
Type: Microsoft Security Bulletin MS16-054
Security Update for Microsoft Office (3155544)

Source: CCN
Type: Microsoft Security Bulletin MS16-070
Security Update for Office (3163610)

Source: CCN
Type: Microsoft Security Bulletin MS16-088
Security Updates for Office (3170008)

Source: CCN
Type: Microsoft Security Bulletin MS16-099
Security Update for Office (3177451)

Source: CCN
Type: Microsoft Security Bulletin MS16-107
Security Update for Microsoft Office (3185852)

Source: CCN
Type: Microsoft Security Bulletin MS16-121
Security Update for Microsoft Office (3194063)

Source: CCN
Type: Microsoft Security Bulletin MS16-133
Security Update for Microsoft Office (3199168)

Source: CCN
Type: Microsoft Security Bulletin MS16-148
Security Update for Microsoft Office (3204068)

Source: CCN
Type: Microsoft Security Bulletin MS17-002
Security Update for Microsoft Office (3214291)

Source: CCN
Type: Microsoft Security Bulletin MS17-013
Security Update for Microsoft Graphics Component (4013075)

Source: CCN
Type: Microsoft Security Bulletin MS17-014
Security Update for Microsoft Office (4013241)

Source: CCN
Type: US-CERT VU#416092
Microsoft Internet Explorer VML stack buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#416092

Source: CCN
Type: Microsoft Security Advisory (925568)
Vulnerability in Vector Markup Language Could Allow Remote Code Execution

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.microsoft.com/technet/security/advisory/925568.mspx

Source: CCN
Type: Microsoft Security Bulletin MS06-055
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (925486)

Source: CCN
Type: Microsoft Security Bulletin MS07-004
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969)

Source: CCN
Type: Microsoft Security Bulletin MS07-050
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (938127)

Source: CCN
Type: Microsoft Security Bulletin MS08-052
Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593)

Source: CCN
Type: Microsoft Security Bulletin MS09-004
Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution (959420)

Source: CCN
Type: Microsoft Security Bulletin MS09-017
Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340)

Source: CCN
Type: Microsoft Security Bulletin MS09-062
Vulnerabilities in GDI+ Could Allow Remote Code Execution (957488)

Source: CCN
Type: Microsoft Security Bulletin MS10-003
Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution (978214)

Source: CCN
Type: Microsoft Security Bulletin MS10-004
Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (975416)

Source: CCN
Type: Microsoft Security Bulletin MS10-028
Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (980094)

Source: CCN
Type: Microsoft Security Bulletin MS10-036
Vulnerabilities in COM validation in Microsoft Office Could Allow Remote Code Execution (983235

Source: CCN
Type: Microsoft Security Bulletin MS10-056
Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)

Source: CCN
Type: Microsoft Security Bulletin MS10-057
Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)

Source: CCN
Type: Microsoft Security Bulletin MS10-079
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194)

Source: CCN
Type: Microsoft Security Bulletin MS10-087
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)

Source: CCN
Type: Microsoft Security Bulletin MS10-105
Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095)

Source: CCN
Type: Microsoft Security Bulletin MS11-008
Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879)

Source: CCN
Type: Microsoft Security Bulletin MS11-021
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2489279)

Source: CCN
Type: Microsoft Security Bulletin MS11-023
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2489293)

Source: CCN
Type: Microsoft Security Bulletin MS11-029
Vulnerability in GDI+ Could Allow Remote Code Execution (2489979)

Source: CCN
Type: Microsoft Security Bulletin MS11-045
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2537146)

Source: CCN
Type: Microsoft Security Bulletin MS11-049
Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893)

Source: CCN
Type: Microsoft Security Bulletin MS11-060
Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978)

Source: CCN
Type: Microsoft Security Bulletin MS11-072
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2587505)

Source: OSVDB
Type: UNKNOWN
28946

Source: CCN
Type: OSVDB ID: 28946
Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution

Source: BUGTRAQ
Type: UNKNOWN
20060919 Yet another 0day for IE

Source: BUGTRAQ
Type: UNKNOWN
20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit

Source: BUGTRAQ
Type: UNKNOWN
20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit

Source: BUGTRAQ
Type: UNKNOWN
20060920 Internet Explorer VML Zero-Day Mitigation

Source: BUGTRAQ
Type: UNKNOWN
20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written

Source: BUGTRAQ
Type: UNKNOWN
20060926 Windows VML security update MS06-055 released

Source: HP
Type: UNKNOWN
SSRT061254

Source: BID
Type: Exploit, Patch
20096

Source: CCN
Type: BID-20096
Microsoft Internet Explorer Vector Markup Language Buffer Overflow Vulnerability

Source: CERT
Type: Patch, US Government Resource
TA06-262A

Source: VUPEN
Type: Vendor Advisory
ADV-2006-3679

Source: CCN
Type: World Wide Web Consortium Note 13-May-1998
Vector Markup Language (VML)

Source: CCN
Type: Internet Security Systems Protection Advisory September 19, 2006
Microsoft Internet Explorer Vector Markup Language Exploit Alert

Source: MS
Type: UNKNOWN
MS06-055

Source: XF
Type: UNKNOWN
ie-vml-bo(29004)

Source: XF
Type: UNKNOWN
ie-vml-bo(29004)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:100

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [09-19-2006]
MS06-055 Microsoft Internet Explorer VML Fill Method Code Execution

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:outlook:2003:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_xp::sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:::itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:::x64:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:100
    V
    VML Buffer Overrun Vulnerability
    2015-08-03
    BACK
    microsoft windows 2003 server * sp1
    microsoft windows xp *
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows 2003 server *
    microsoft windows 2003 server * gold
    microsoft windows 2000 * sp4
    microsoft windows 2003 server *
    microsoft windows 2003 server *
    microsoft outlook 2003
    microsoft internet explorer 6.0
    microsoft windows 2000 * sp4
    microsoft internet explorer 5.0.1 sp4
    microsoft ie 6.0 sp1
    microsoft internet explorer 5.01 sp4
    microsoft windows xp sp1
    microsoft windows 2000 sp4
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003 server
    microsoft windows 2003_server sp1
    microsoft windows xp
    microsoft windows 2003_server sp1_itanium