Vulnerabilities > CVE-2006-0003 - Remote Code Execution vulnerability in Microsoft MDAC RDS.Dataspace ActiveX Control

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
microsoft
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.

Exploit-Db

  • descriptionMS Internet Explorer (MDAC) Remote Code Execution Exploit (MS06-014). CVE-2006-0003. Remote exploit for windows platform
    fileexploits/windows/remote/2052.sh
    idEDB-ID:2052
    last seen2016-01-31
    modified2006-07-21
    platformwindows
    port
    published2006-07-21
    reporterredsand
    sourcehttps://www.exploit-db.com/download/2052/
    titleMicrosoft Internet Explorer - MDAC Remote Code Execution Exploit MS06-014
    typeremote
  • descriptionInternet Explorer (MDAC) Remote Code Execution Exploit (MS06-014) (2). CVE-2006-0003. Remote exploit for windows platform
    fileexploits/windows/remote/2164.pm
    idEDB-ID:2164
    last seen2016-01-31
    modified2006-08-10
    platformwindows
    port
    published2006-08-10
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/2164/
    titleMicrosoft Internet Explorer - MDAC Remote Code Execution Exploit MS06-014 2
    typeremote
  • descriptionInternet Explorer COM CreateObject Code Execution. CVE-2006-0003,CVE-2006-4704. Remote exploit for windows platform
    idEDB-ID:16561
    last seen2016-02-02
    modified2010-09-20
    published2010-09-20
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16561/
    titleMicrosoft Internet Explorer - COM CreateObject Code Execution

Metasploit

descriptionThis module exploits a generic code execution vulnerability in Internet Explorer by abusing vulnerable ActiveX objects.
idMSF:EXPLOIT/WINDOWS/BROWSER/IE_CREATEOBJECT
last seen2020-05-23
modified2017-07-24
published2009-07-22
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ie_createobject.rb
titleMS06-014 Microsoft Internet Explorer COM CreateObject Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS06-014.NASL
descriptionThe remote Microsoft Data Access Component (MDAC) server is vulnerable to a flaw that could allow a local administrator to elevate his privileges to the
last seen2020-06-01
modified2020-06-02
plugin id21211
published2006-04-11
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21211
titleMS06-014: Vulnerability in MDAC Could Allow Code Execution (911562)

Oval

  • accepted2011-05-16T04:00:32.349-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameClifford Farrugia
      organizationGFI Software
    • nameDragos Prisaca
      organizationGideon Technologies, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionUnspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
    familywindows
    idoval:org.mitre.oval:def:1204
    statusaccepted
    submitted2006-04-12T12:55:00.000-04:00
    titleWinXP,SP2 Microsoft Data Access Components RDS.Dataspace Remote Code Execution Vulnerability
    version13
  • accepted2011-05-16T04:00:51.262-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameClifford Farrugia
      organizationGFI Software
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionUnspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
    familywindows
    idoval:org.mitre.oval:def:1323
    statusaccepted
    submitted2006-04-12T12:55:00.000-04:00
    titleServer 2003 Microsoft Data Access Components RDS.Dataspace Remote Code Execution Vulnerability
    version12
  • accepted2011-05-16T04:01:10.821-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameClifford Farrugia
      organizationGFI Software
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionUnspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
    familywindows
    idoval:org.mitre.oval:def:1511
    statusaccepted
    submitted2006-04-12T12:55:00.000-04:00
    titleWinXP,SP1 Microsoft Data Access Components RDS.Dataspace Remote Code Execution Vulnerability
    version15
  • accepted2011-05-16T04:01:42.674-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameClifford Farrugia
      organizationGFI Software
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionUnspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
    familywindows
    idoval:org.mitre.oval:def:1742
    statusaccepted
    submitted2006-04-12T12:55:00.000-04:00
    titleWindows (S03,SP1/XP 64-bit) Microsoft Data Access Components RDS.Dataspace Remote Code Execution Vulnerability
    version15
  • accepted2011-05-16T04:01:48.563-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameAnna Min
      organizationBigFix, Inc
    • nameClifford Farrugia
      organizationGFI Software
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionUnspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
    familywindows
    idoval:org.mitre.oval:def:1778
    statusaccepted
    submitted2006-04-12T12:55:00.000-04:00
    titleMicrosoft Windows 2000 Microsoft Data Access Components RDS.Dataspace Remote Code Execution Vulnerability
    version12

Saint

bid17462
descriptionWindows MDAC RDS.Dataspace ActiveX control vulnerability
idwin_patch_mdacrce
osvdb24517
titlemdac_rds_dataspace
typeclient

References