CVE-2006-3281
Microsoft Windows XP/2000/2003 - Explorer Drag and Drop Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.
Microsoft Internet Explorer v6.0 no maneja apropiadamente los eventos Drag y Drop, lo que permite a atacantes remotos asistidos por el usuario ejecutar código de su elección a través de un enlace al fichero compartido SMB con un nombre que contiene una secuencia codificada ..\ (%2e%2e%5c)y cuya extensión incluye al identificador CLSID Key para HTML Applications (HTA), como "Folder GUID Code Execution Vulnerability." NOTA: la secuencia de salto de directorio fue usado en el exploit original, aunque sus roles no quedan claros.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-06-28 CVE Reserved
- 2006-06-28 CVE Published
- 2006-07-27 First Exploit
- 2024-08-07 CVE Updated
- 2024-10-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047398.html | Mailing List | |
http://securitytracker.com/id?1016388 | Vdb Entry | |
http://www.kb.cert.org/vuls/id/655100 | Third Party Advisory | |
http://www.securityfocus.com/bid/19389 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA06-220A.html | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27456 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A318 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20825 | 2021-07-23 | |
http://www.vupen.com/english/advisories/2006/2553 | 2021-07-23 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045 | 2021-07-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Internet Explorer Search vendor "Microsoft" for product "Internet Explorer" | 6.0 Search vendor "Microsoft" for product "Internet Explorer" and version "6.0" | - |
Affected
|