#VU1206 Buffer overflow in Windows and Windows Server - CVE-2006-4868 

 

#VU1206 Buffer overflow in Windows and Windows Server - CVE-2006-4868

Published: December 5, 2016


Vulnerability identifier: #VU1206
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2006-4868
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Windows
Windows Server
Software vendor:
Microsoft

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to incorrect handling of input data in Vector Markup Language (VML) implementation (VGX.dll) in Microsoft Windows. A remote unauthenticated attacker can trick the victim to open a specially crafted web page or HTML file and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability is being actively exploited.


Remediation

Install updated from vendor's website:
Microsoft Windows 2000 Service Pack 4:
Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 — Download the update
Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 — Download the update
Microsoft Windows XP Service Pack 1 — Download the update
Microsoft Windows XP Service Pack 2 — Download the update
Microsoft Windows XP Professional x64 Edition — Download the update
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 — Download the update
Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems — Download the update
Microsoft Windows Server 2003 x64 Edition — Download the update


External links