CVE-2006-3376
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
Desbordamiento de entero en el archivo player.c en libwmf 0.2.8.4, utilizado en múltiples productos incluyendo (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, y(6) imagemagick, que permite a los atacantes remotos ejecutar arbitrariamente código a través del campo cabecera MaxRecordSize en un archivo WMF.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-07-06 CVE Reserved
- 2006-07-06 CVE Published
- 2023-06-17 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/21064 | Third Party Advisory | |
http://secunia.com/advisories/21261 | Third Party Advisory | |
http://secunia.com/advisories/21419 | Third Party Advisory | |
http://secunia.com/advisories/21459 | Third Party Advisory | |
http://secunia.com/advisories/21473 | Third Party Advisory | |
http://secunia.com/advisories/22311 | Third Party Advisory | |
http://securityreason.com/securityalert/1190 | Third Party Advisory | |
http://securitytracker.com/id?1016518 | Vdb Entry | |
http://www.securityfocus.com/archive/1/438803/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/18751 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2646 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27516 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10262 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2006-0597.html | 2018-10-18 | |
http://secunia.com/advisories/20921 | 2018-10-18 | |
http://security.gentoo.org/glsa/glsa-200608-17.xml | 2018-10-18 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:132 | 2018-10-18 | |
http://www.novell.com/linux/security/advisories/2006_19_sr.html | 2018-10-18 | |
http://www.ubuntu.com/usn/usn-333-1 | 2018-10-18 | |
https://www.debian.org/security/2006/dsa-1194 | 2018-10-18 | |
https://access.redhat.com/security/cve/CVE-2006-3376 | 2006-07-18 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1618139 | 2006-07-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wvware Search vendor "Wvware" | Libwmf Search vendor "Wvware" for product "Libwmf" | 0.2.8_.4 Search vendor "Wvware" for product "Libwmf" and version "0.2.8_.4" | - |
Affected
| ||||||
Wvware Search vendor "Wvware" | Wv2 Search vendor "Wvware" for product "Wv2" | 0.2.1 Search vendor "Wvware" for product "Wv2" and version "0.2.1" | - |
Affected
| ||||||
Wvware Search vendor "Wvware" | Wv2 Search vendor "Wvware" for product "Wv2" | 0.2.2 Search vendor "Wvware" for product "Wv2" and version "0.2.2" | - |
Affected
| ||||||
Wvware Search vendor "Wvware" | Wv2 Search vendor "Wvware" for product "Wv2" | 0.2.3 Search vendor "Wvware" for product "Wv2" and version "0.2.3" | - |
Affected
|