Vulnerability Name: CVE-2006-4868 (CCN-29004) Assigned: 2006-09-19 Published: 2006-09-19 Updated: 2021-07-23 Summary: Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag. CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )4.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Wed Sep 20 2006 - 13:03:01 CDTvml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit Source: MISC Type: UNKNOWNhttp://blogs.securiteam.com/index.php/archives/624 Source: MITRE Type: CNACVE-2006-4868 Source: CCN Type: Microsoft.comIntroduction to Vector Markup Language (VML) Source: CCN Type: SA21989Microsoft Vector Graphics Rendering Library Buffer Overflow Source: SECUNIA Type: Patch, Vendor Advisory21989 Source: CCN Type: SECTRACK ID: 1016879Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1016879 Source: MISC Type: UNKNOWNhttp://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html Source: CCN Type: ASA-2006-238Vulnerability in Vector Markup Language Could Allow Remote Code Execution (MS06-055) Source: MSKB Type: UNKNOWN925486 Source: CCN Type: Microsoft Security Bulletin MS11-096Vulnerability in Microsoft Excel Could Allow Remote Code Execution (2640241) Source: CCN Type: Microsoft Security Bulletin MS12-028Vulnerability in Microsoft Office Could Allow for Remote Code Execution (2639185) Source: CCN Type: Microsoft Security Bulletin MS12-029Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352) Source: CCN Type: Microsoft Security Bulletin MS12-034Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578) Source: CCN Type: Microsoft Security Bulletin MS12-057Vulnerability in Microsoft Office Could Allow for Remote Code Execution (2731879) Source: CCN Type: Microsoft Security Bulletin MS12-064Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319) Source: CCN Type: Microsoft Security Bulletin MS12-065Vulnerability in Microsoft Works Could Allow Remote Code Execution (KB2754670) Source: CCN Type: Microsoft Security Bulletin MS12-070Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849) Source: CCN Type: Microsoft Security Bulletin MS12-079Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642) Source: CCN Type: Microsoft Security Bulletin MS13-022Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) Source: CCN Type: Microsoft Security Bulletin MS13-043Vulnerability in Microsoft Word Could Allow Remote Code Execution (2830399) Source: CCN Type: Microsoft Security Bulletin MS13-054Vulnerability in Windows Components Could Allow Remote Code Execution (2848295) Source: CCN Type: Microsoft Security Bulletin MS13-072Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537) Source: CCN Type: Microsoft Security Bulletin MS13-085Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080) Source: CCN Type: Microsoft Security Bulletin MS13-086Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084) Source: CCN Type: Microsoft Security Bulletin MS14-001Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2916605) Source: CCN Type: Microsoft Security Bulletin MS14-017Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2949660) Source: CCN Type: Microsoft Security Bulletin MS14-034Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261) Source: CCN Type: Microsoft Security Bulletin MS14-038Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689) Source: CCN Type: Microsoft Security Bulletin MS14-044Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) Source: CCN Type: Microsoft Security Bulletin MS14-061Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434) Source: CCN Type: Microsoft Security Bulletin MS14-069Vulnerability in Microsoft Office Could Allow Remote Code Execution (3009710) Source: CCN Type: Microsoft Security Bulletin MS14-081Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3017301) Source: CCN Type: Microsoft Security Bulletin MS14-083Vulnerabilities in MicrosoftExcel Could Allow Remote Code Execution (3017347) Source: CCN Type: Microsoft Security Bulletin MS15-081Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3080790) Source: CCN Type: Microsoft Security Bulletin MS15-099Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3089664) Source: CCN Type: Microsoft Security Bulletin MS15-110Security Updates for Microsoft Office (3096440) Source: CCN Type: Microsoft Security Bulletin MS15-116Security Updates for Microsoft Office to Address Remote Code Execution (3104540) Source: CCN Type: Microsoft Security Bulletin MS15-131Security Update for Microsoft Office to Address Remote Code Execution (3116111) Source: CCN Type: Microsoft Security Bulletin MS16-004Security Update for Microsoft Office to Address Remote Code Execution - Critical (3124585) Source: CCN Type: Microsoft Security Bulletin MS16-015Security Update for Microsoft Office to Address Remote Code Execution (3134226) Source: CCN Type: Microsoft Security Bulletin MS16-029Security Update for Microsoft Office to Address Remote Code Execution (3141806) Source: CCN Type: Microsoft Security Bulletin MS16-042Security Update for Microsoft Office (3148775) Source: CCN Type: Microsoft Security Bulletin MS16-054Security Update for Microsoft Office (3155544) Source: CCN Type: Microsoft Security Bulletin MS16-070Security Update for Office (3163610) Source: CCN Type: Microsoft Security Bulletin MS16-088Security Updates for Office (3170008) Source: CCN Type: Microsoft Security Bulletin MS16-099Security Update for Office (3177451) Source: CCN Type: Microsoft Security Bulletin MS16-107Security Update for Microsoft Office (3185852) Source: CCN Type: Microsoft Security Bulletin MS16-121Security Update for Microsoft Office (3194063) Source: CCN Type: Microsoft Security Bulletin MS16-133Security Update for Microsoft Office (3199168) Source: CCN Type: Microsoft Security Bulletin MS16-148Security Update for Microsoft Office (3204068) Source: CCN Type: Microsoft Security Bulletin MS17-002Security Update for Microsoft Office (3214291) Source: CCN Type: Microsoft Security Bulletin MS17-013Security Update for Microsoft Graphics Component (4013075) Source: CCN Type: Microsoft Security Bulletin MS17-014Security Update for Microsoft Office (4013241) Source: CCN Type: US-CERT VU#416092Microsoft Internet Explorer VML stack buffer overflow Source: CERT-VN Type: US Government ResourceVU#416092 Source: CCN Type: Microsoft Security Advisory (925568)Vulnerability in Vector Markup Language Could Allow Remote Code Execution Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.microsoft.com/technet/security/advisory/925568.mspx Source: CCN Type: Microsoft Security Bulletin MS06-055Vulnerability in Vector Markup Language Could Allow Remote Code Execution (925486) Source: CCN Type: Microsoft Security Bulletin MS07-004Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969) Source: CCN Type: Microsoft Security Bulletin MS07-050Vulnerability in Vector Markup Language Could Allow Remote Code Execution (938127) Source: CCN Type: Microsoft Security Bulletin MS08-052Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593) Source: CCN Type: Microsoft Security Bulletin MS09-004Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution (959420) Source: CCN Type: Microsoft Security Bulletin MS09-017Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340) Source: CCN Type: Microsoft Security Bulletin MS09-062Vulnerabilities in GDI+ Could Allow Remote Code Execution (957488) Source: CCN Type: Microsoft Security Bulletin MS10-003Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution (978214) Source: CCN Type: Microsoft Security Bulletin MS10-004Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (975416) Source: CCN Type: Microsoft Security Bulletin MS10-028Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (980094) Source: CCN Type: Microsoft Security Bulletin MS10-036Vulnerabilities in COM validation in Microsoft Office Could Allow Remote Code Execution (983235 Source: CCN Type: Microsoft Security Bulletin MS10-056Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638) Source: CCN Type: Microsoft Security Bulletin MS10-057Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707) Source: CCN Type: Microsoft Security Bulletin MS10-079Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194) Source: CCN Type: Microsoft Security Bulletin MS10-087Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) Source: CCN Type: Microsoft Security Bulletin MS10-105Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095) Source: CCN Type: Microsoft Security Bulletin MS11-008Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879) Source: CCN Type: Microsoft Security Bulletin MS11-021Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2489279) Source: CCN Type: Microsoft Security Bulletin MS11-023Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2489293) Source: CCN Type: Microsoft Security Bulletin MS11-029Vulnerability in GDI+ Could Allow Remote Code Execution (2489979) Source: CCN Type: Microsoft Security Bulletin MS11-045Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2537146) Source: CCN Type: Microsoft Security Bulletin MS11-049Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893) Source: CCN Type: Microsoft Security Bulletin MS11-060Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978) Source: CCN Type: Microsoft Security Bulletin MS11-072Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2587505) Source: OSVDB Type: UNKNOWN28946 Source: CCN Type: OSVDB ID: 28946Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution Source: BUGTRAQ Type: UNKNOWN20060919 Yet another 0day for IE Source: BUGTRAQ Type: UNKNOWN20060920 vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit Source: BUGTRAQ Type: UNKNOWN20060920 RE: vml.c - Internet Explorer VML Buffer Overflow Download Exec Exploit Source: BUGTRAQ Type: UNKNOWN20060920 Internet Explorer VML Zero-Day Mitigation Source: BUGTRAQ Type: UNKNOWN20060924 Windows VML Vulnerability FAQ (CVE-2006-4868) written Source: BUGTRAQ Type: UNKNOWN20060926 Windows VML security update MS06-055 released Source: HP Type: UNKNOWNSSRT061254 Source: BID Type: Exploit, Patch20096 Source: CCN Type: BID-20096Microsoft Internet Explorer Vector Markup Language Buffer Overflow Vulnerability Source: CERT Type: Patch, US Government ResourceTA06-262A Source: VUPEN Type: Vendor AdvisoryADV-2006-3679 Source: CCN Type: World Wide Web Consortium Note 13-May-1998Vector Markup Language (VML) Source: CCN Type: Internet Security Systems Protection Advisory September 19, 2006Microsoft Internet Explorer Vector Markup Language Exploit Alert Source: MS Type: UNKNOWNMS06-055 Source: XF Type: UNKNOWNie-vml-bo(29004) Source: XF Type: UNKNOWNie-vml-bo(29004) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:100 Source: CCN Type: Rapid7 Vulnerability and Exploit Database [09-19-2006]MS06-055 Microsoft Internet Explorer VML Fill Method Code Execution Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:* AND cpe:/a:microsoft:outlook:2003:*:*:*:*:*:*:* OR cpe:/a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* Configuration 2 :cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* AND cpe:/a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:microsoft:ie:6.0:sp1:*:*:*:*:*:* OR cpe:/a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:* AND cpe:/o:microsoft:windows_xp::sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:::itanium:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:::x64:*:professional:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2003 server * sp1
microsoft windows xp *
microsoft windows xp * sp1
microsoft windows xp * sp2
microsoft windows 2003 server *
microsoft windows 2003 server * gold
microsoft windows 2000 * sp4
microsoft windows 2003 server *
microsoft windows 2003 server *
microsoft outlook 2003
microsoft internet explorer 6.0
microsoft windows 2000 * sp4
microsoft internet explorer 5.0.1 sp4
microsoft ie 6.0 sp1
microsoft internet explorer 5.01 sp4
microsoft windows xp sp1
microsoft windows 2000 sp4
microsoft windows 2003_server
microsoft windows xp sp2
microsoft windows 2003 server
microsoft windows 2003_server sp1
microsoft windows xp
microsoft windows 2003_server sp1_itanium