CVE-2006-3086
Microsoft Excel - Unicode Local Overflow (PoC)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the HrShellOpenWithMonikerDisplayName function in Microsoft Hyperlink Object Library (hlink.dll) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long hyperlink, as demonstrated using an Excel worksheet with a long link in Unicode, aka "Hyperlink COM Object Buffer Overflow Vulnerability." NOTE: this is a different issue than CVE-2006-3059.
Un desbordamiento de búfer basado en pila en la función HrShellOpenWithMonikerDisplayName en la Biblioteca de objetos de Hipervínuclo de Microsoft (hlink.dll) permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de un hipervínculo demasiado largo, tal y como se demuestra con una hoja de cálculo Excel con un enlace en Unicode demasiado largo. Se trata de un problema también conocido como "vulnerabilidad de desbordamiento de búfer del objeto hipervínculo COM." NOTA: se trata de un problema diferente al del CVE-2006-3059.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-06-18 First Exploit
- 2006-06-19 CVE Reserved
- 2006-06-19 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx | X_refsource_misc | |
http://marc.info/?l=full-disclosure&m=115067840426070&w=2 | Mailing List | |
http://www.kb.cert.org/vuls/id/394444 | Third Party Advisory | |
http://www.osvdb.org/26666 | Vdb Entry | |
http://www.securityfocus.com/archive/1/438057/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/438093/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/438096/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/438156/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/438373/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/442724/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2006/2431 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27224 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A999 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/1927 | 2006-06-18 | |
http://www.securityfocus.com/bid/18500 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20748 | 2018-10-18 | |
http://securitytracker.com/id?1016339 | 2018-10-18 | |
http://www.tippingpoint.com/security/advisories/TSRT-06-10.html | 2018-10-18 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 | 2018-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Hyperlink Object Library Search vendor "Microsoft" for product "Hyperlink Object Library" | * | - |
Affected
|