Vulnerabilities > CVE-2006-1311 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 | |
OS | 3 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-013.NASL |
description | The remote host contains a version of Microsoft Windows and/or Microsoft Office that has a vulnerability in the RichEdit component that could be abused by an attacker to execute arbitrary code on the remote host. To exploit this vulnerability, an attacker would need to spend a specially crafted RTF file to a user on the remote host and lure him into opening it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24337 |
published | 2007-02-13 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24337 |
title | MS07-013: Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution (918118) |
Oval
accepted | 2012-05-28T04:00:05.356-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
description | The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:1090 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2007-02-14T09:49:32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Microsoft RichEdit Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 76 |
References
- http://secunia.com/advisories/24152
- http://secunia.com/advisories/24152
- http://www.kb.cert.org/vuls/id/368132
- http://www.kb.cert.org/vuls/id/368132
- http://www.osvdb.org/31886
- http://www.osvdb.org/31886
- http://www.securityfocus.com/bid/21876
- http://www.securityfocus.com/bid/21876
- http://www.securitytracker.com/id?1017640
- http://www.securitytracker.com/id?1017640
- http://www.securitytracker.com/id?1017641
- http://www.securitytracker.com/id?1017641
- http://www.us-cert.gov/cas/techalerts/TA07-044A.html
- http://www.us-cert.gov/cas/techalerts/TA07-044A.html
- http://www.vupen.com/english/advisories/2007/0582
- http://www.vupen.com/english/advisories/2007/0582
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-013
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30592
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30592
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1090
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1090