Vulnerabilities > CVE-2006-0014 - Unspecified vulnerability in Microsoft Outlook Express 5.5/6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-016.NASL |
description | The remote host is running a version of Microsoft Outlook Express that may allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed Windows Address Book (.wab) file to a victim on the remote host and have him open the file. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21213 |
published | 2006-04-11 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21213 |
title | MS06-016: Vulnerability in Outlook Express Could Allow Remote Code Execution (911567) |
code |
|
Oval
accepted 2011-05-16T04:01:26.956-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc name Robert L. Hollis organization ThreatGuard, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Tim Harrison organization National Institute of Standards and Technology name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1611 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6 (XP,SP2) WAB Remote Code Execution Vulnerability version 72 accepted 2011-05-16T04:01:35.093-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Anna Min organization BigFix, Inc name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1682 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6,SP1 WAB Remote Code Execution Vulnerability version 69 accepted 2011-01-17T04:00:18.065-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc name Tim Harrison organization National Institute of Standards and Technology
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1769 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6 (64-bit XP) WAB Remote Code Execution Vulnerability version 67 accepted 2011-05-16T04:01:46.627-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc name Jonathan Baker organization The MITRE Corporation name Tim Harrison organization National Institute of Standards and Technology name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1771 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6 (S03-Gold, Itanium) WAB Remote Code Execution Vulnerability version 71 accepted 2006-11-14T08:57:55.387-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1780 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 5.5 WAB Remote Code Execution Vulnerability version 65 accepted 2011-05-16T04:01:50.849-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc name Tim Harrison organization National Institute of Standards and Technology name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:1791 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6 (S03,SP1) WAB Remote Code Execution Vulnerability version 70 accepted 2011-05-16T04:03:31.624-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Anna Min organization BigFix, Inc name Jonathan Baker organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Tim Harrison organization National Institute of Standards and Technology name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. family windows id oval:org.mitre.oval:def:812 status accepted submitted 2006-04-12T12:55:00.000-04:00 title Microsoft Outlook Express 6 (S03-Gold) WAB Remote Code Execution Vulnerability version 72
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045003.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045003.html
- http://secunia.com/advisories/19617
- http://secunia.com/advisories/19617
- http://securityreason.com/securityalert/691
- http://securityreason.com/securityalert/691
- http://securitytracker.com/id?1015898
- http://securitytracker.com/id?1015898
- http://www.securityfocus.com/archive/1/430645/100/0/threaded
- http://www.securityfocus.com/archive/1/430645/100/0/threaded
- http://www.securityfocus.com/bid/17459
- http://www.securityfocus.com/bid/17459
- http://www.vupen.com/english/advisories/2006/1321
- http://www.vupen.com/english/advisories/2006/1321
- http://www.zerodayinitiative.com/advisories/ZDI-06-007.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-007.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-016
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-016
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25535
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25535
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1611
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1611
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1682
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1682
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1769
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1769
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1771
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1771
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1780
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1780
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1791
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1791
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A812
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A812