Vulnerabilities > CVE-2006-3590 - Unspecified vulnerability in Microsoft Powerpoint 2000/2002/2003
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-048.NASL |
description | The remote host is running a version of Microsoft Office that could allow arbitrary code execution. To succeed, the attacker would have to send a rogue file to a user of the remote computer and have him open it with Microsoft Office. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22190 |
published | 2006-08-08 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22190 |
title | MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922968) |
Oval
accepted | 2012-05-28T04:01:41.229-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:399 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2006-08-11T12:53:40 | ||||||||||||
title | Microsoft PowerPoint Mso.dll Vulnerability | ||||||||||||
version | 9 |
References
- http://blogs.securiteam.com/?p=508
- http://blogs.securiteam.com/?p=508
- http://isc.sans.org/diary.php?storyid=1484
- http://isc.sans.org/diary.php?storyid=1484
- http://secunia.com/advisories/21040
- http://secunia.com/advisories/21040
- http://securityresponse.symantec.com/avcenter/venc/data/trojan.ppdropper.b.html
- http://securityresponse.symantec.com/avcenter/venc/data/trojan.ppdropper.b.html
- http://securitytracker.com/id?1016496
- http://securitytracker.com/id?1016496
- http://www.kb.cert.org/vuls/id/936945
- http://www.kb.cert.org/vuls/id/936945
- http://www.osvdb.org/27324
- http://www.osvdb.org/27324
- http://www.securityfocus.com/archive/1/440137/100/0/threaded
- http://www.securityfocus.com/archive/1/440137/100/0/threaded
- http://www.securityfocus.com/archive/1/440255/100/0/threaded
- http://www.securityfocus.com/archive/1/440255/100/0/threaded
- http://www.securityfocus.com/archive/1/440532/100/0/threaded
- http://www.securityfocus.com/archive/1/440532/100/0/threaded
- http://www.securityfocus.com/bid/18957
- http://www.securityfocus.com/bid/18957
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.vupen.com/english/advisories/2006/2795
- http://www.vupen.com/english/advisories/2006/2795
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27740
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27740
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27781
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27781
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A399
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A399