CVE-2006-6134
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
Desbordamiento de búfer basado en montículo en la función WMCheckURLScheme de WMVCORE.DLL en Microsoft Windows Media Player (WMP) 10.00.00.4036 en Windows XP SP2, Server 2003, y Server 2003 SP1 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) y ejecutar código de su elección mediante un atributo HREF largo, utilizando un protocolo no reconocido, en un elemento REF de un archivo de lista de reproducción ASX.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-27 CVE Reserved
- 2006-11-28 CVE Published
- 2024-08-03 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://blogs.technet.com/msrc/archive/2006/12/07/public-proof-of-concept-code-for-asx-file-format-isssue.aspx | X_refsource_confirm | |
http://research.eeye.com/html/alerts/zeroday/20061122.html | X_refsource_misc | |
http://securityreason.com/securityalert/1922 | Third Party Advisory | |
http://securitytracker.com/id?1017354 | Vdb Entry | |
http://support.avaya.com/elmodocs2/security/ASA-2006-274.htm | X_refsource_confirm | |
http://www.kb.cert.org/vuls/id/208769 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/452352/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/453579/100/0/threaded | Mailing List | |
http://www.us-cert.gov/cas/techalerts/TA06-346A.html | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A669 | Signature |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/21247 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/22971 | 2018-10-17 | |
http://www.securityfocus.com/archive/1/454969/100/200/threaded | 2018-10-17 | |
http://www.vupen.com/english/advisories/2006/4882 | 2018-10-17 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows Media Player Search vendor "Microsoft" for product "Windows Media Player" | 10.00.00.4036 Search vendor "Microsoft" for product "Windows Media Player" and version "10.00.00.4036" | - |
Affected
|