Vulnerabilities > CVE-2006-0002 - Unspecified vulnerability in Microsoft Exchange Server, Office and Outlook
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 16 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-003.NASL |
description | The remote host is running a version of Outlook or Exchange containing a bug in the Transport Neutral Encapsulation Format (TNEF) MIME attachment handling routine that could allow an attacker execute arbitrary code on the remote host by sending a specially crafted email. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20390 |
published | 2006-01-10 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20390 |
title | MS06-003: Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution (902412) |
code |
|
Oval
accepted 2006-02-22T08:27:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:1082 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Exchange 2000 Server TNEF Decoding Vulnerability version 64 accepted 2012-05-28T04:00:08.768-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Clifford Farrugia organization GFI Software name Sharath S organization SecPod Technologies name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc.
description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:1165 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Outlook 2002 TNEF Decoding Vulnerability version 14 accepted 2006-02-22T08:27:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:1316 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Exchange Server 5.0 TNEF Decoding Vulnerability version 3 accepted 2012-05-28T04:00:56.833-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Clifford Farrugia organization GFI Software name Sharath S organization SecPod Technologies name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc.
description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:1456 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Outlook 2003 TNEF Decoding Vulnerability version 13 accepted 2012-05-28T04:01:00.111-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Clifford Farrugia organization GFI Software name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc.
description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:1485 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Outlook 2000 TNEF Decoding Vulnerability version 12 accepted 2007-11-13T12:01:20.045-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jeff Cheng organization Opsware, Inc.
description Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. family windows id oval:org.mitre.oval:def:624 status accepted submitted 2006-01-11T12:56:00.000-04:00 title Exchange Server 5.5 TNEF Decoding Vulnerability version 65
References
- http://www.kb.cert.org/vuls/id/252146
- http://www.securityfocus.com/bid/16197
- http://secunia.com/advisories/18368
- http://www.us-cert.gov/cas/techalerts/TA06-010A.html
- http://securitytracker.com/id?1015461
- http://securitytracker.com/id?1015460
- http://support.avaya.com/elmodocs2/security/ASA-2006-004.htm
- http://securityreason.com/securityalert/330
- http://securityreason.com/securityalert/331
- http://www.vupen.com/english/advisories/2006/0119
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22878
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A624
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1485
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1456
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1316
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1165
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1082
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003
- http://www.securityfocus.com/archive/1/421520/100/0/threaded
- http://www.securityfocus.com/archive/1/421518/100/0/threaded