ID

VAR-200607-0007


CVE

CVE-2006-0026


TITLE

Microsoft DHCP Client service contains a buffer overflow

Trust: 0.8

sources: CERT/CC: VU#257164

DESCRIPTION

Buffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote attackers to execute arbitrary code via crafted Active Server Pages (ASP). Microsoft DHCP Client service contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. Microsoft Office applications fail to properly handle PNG images. To exploit this issue, attackers must be able to place and execute malicious ASP pages on computers running the affected ASP server software. This may be an issue in shared-hosting environments. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-192A Microsoft Windows, Office, and IIS Vulnerabilities Original release date: July 11, 2006 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Information Services (IIS) * Microsoft Office * Microsoft Office for Mac * Microsoft Access * Microsoft Excel and Excel Viewer * Microsoft FrontPage * Microsoft InfoPath * Microsoft OneNote * Microsoft Outlook * Microsoft PowerPoint * Microsoft Project * Microsoft Publisher * Microsoft Visio * Microsoft Word and Word Viewer Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, IIS, and Office. I. Description Microsoft Security Bulletin Summary for July 2006 addresses vulnerabilities in Microsoft products including Windows, IIS, and Office. (CVE-2006-0007) In MS06-037, Microsoft has released updates for the Excel vulnerability (VU#802324) described in Technical Cyber Security Alert TA06-167A. II. An attacker may also be able to cause a denial of service. III. Solution Apply a patch from your vendor Microsoft has provided updates for these vulnerabilities in the Security Bulletins. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using Windows Server Update Services (WSUS). Workaround Please see the following Vulnerability Notes for workarounds. Appendix A. References * Microsoft Security Bulletin Summary for July 2006 - <http://www.microsoft.com/technet/security/bulletin/ms06-jul.mspx> * Technical Cyber Security Alert TA06-167A - <http://www.us-cert.gov/cas/techalerts/TA06-167A.html> * US-CERT Vulnerability Notes for Microsoft July 2006 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms06-jul> * US-CERT Vulnerability Note VU#395588 - <http://www.kb.cert.org/vuls/id/395588> * US-CERT Vulnerability Note VU#189140 - <http://www.kb.cert.org/vuls/id/189140> * US-CERT Vulnerability Note VU#257164 - <http://www.kb.cert.org/vuls/id/257164> * US-CERT Vulnerability Note VU#802324 - <http://www.kb.cert.org/vuls/id/802324> * US-CERT Vulnerability Note VU#580036 - <http://www.kb.cert.org/vuls/id/580036> * US-CERT Vulnerability Note VU#609868 - <http://www.kb.cert.org/vuls/id/609868> * US-CERT Vulnerability Note VU#409316 - <http://www.kb.cert.org/vuls/id/409316> * US-CERT Vulnerability Note VU#459388 - <http://www.kb.cert.org/vuls/id/459388> * US-CERT Vulnerability Note VU#668564 - <http://www.kb.cert.org/vuls/id/668564> * CVE-2006-0026 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0026> * CVE-2006-1314 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1314> * CVE-2006-2372 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2372> * CVE-2006-3059 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3059> * CVE-2006-1316 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1316> * CVE-2006-1540 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1540> * CVE-2006-2389 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2389> * CVE-2006-0033 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0033> * CVE-2006-0007 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0007> * Microsoft Update - <https://update.microsoft.com/microsoftupdate> * Microsoft Office Update - <http://officeupdate.microsoft.com> * Mactopia - <http://www.microsoft.com/mac> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-192A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-192A Feedback VU#802324" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History July 11, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRLQsLn0pj593lg50AQLyjQf/blQM+kdtxI5/dQ/Njj99QuR3yBT9ERwJ QfZgOr8yN4rUhOU1xkXq6go7E1W4kfwuKVwwobLuYXk9Cq6xP4aVpt0/ws53wNHI iAvJ1rURSFcVwDAXKvbiv7mmjORA36R5M37JiwR0ny76f20yZaz8LTjMbhwSLyFR Cj7kPE0o6Fu0uUwI7ETskfcK4iF0PVoVW2mava1YG8zFuby/A+Ps7ddQvu/EcaxP Y12QXtCP1jsB3+iJKAh7aQAh9h8aV6nuq4NZyFAHmao8iQo7qd9BMG451xTPDxn3 PoM2y5R0bXko+E4hWudpjel/JABm+nIV3R9il1QDantUI0aCqTDS9A== =7GPc -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Want to join the Secunia Security Team? Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. The vulnerability is caused due to an unknown error within the processing of specially crafted Excel documents. The vulnerability has been confirmed on a fully updated Windows XP SP2 system with Microsoft Excel 2003 SP2. Other versions may also be affected. NOTE: This vulnerability is a so-called 0-day and is already being actively exploited. SOLUTION: Don't open untrusted Excel documents. PROVIDED AND/OR DISCOVERED BY: Discovered in the wild. ORIGINAL ADVISORY: Microsoft: http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 8.55

sources: NVD: CVE-2006-0026 // CERT/CC: VU#257164 // CERT/CC: VU#189140 // CERT/CC: VU#668564 // CERT/CC: VU#459388 // CERT/CC: VU#395588 // CERT/CC: VU#609868 // CERT/CC: VU#580036 // CERT/CC: VU#409316 // CERT/CC: VU#802324 // JVNDB: JVNDB-2006-000375 // BID: 18858 // PACKETSTORM: 48187 // PACKETSTORM: 47474

AFFECTED PRODUCTS

vendor:microsoftmodel: - scope: - version: -

Trust: 7.2

vendor:microsoftmodel:internet information serverscope:eqversion:6.0

Trust: 1.6

vendor:microsoftmodel:internet information servicesscope:eqversion:5.0

Trust: 1.6

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.1

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.1

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 1.1

vendor:microsoftmodel:internet information serverscope:eqversion:5.0

Trust: 0.6

vendor:microsoftmodel:internet information serverscope:eqversion:5.1

Trust: 0.6

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc editionscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xpscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.3

sources: CERT/CC: VU#257164 // CERT/CC: VU#189140 // CERT/CC: VU#668564 // CERT/CC: VU#459388 // CERT/CC: VU#395588 // CERT/CC: VU#609868 // CERT/CC: VU#580036 // CERT/CC: VU#409316 // CERT/CC: VU#802324 // BID: 18858 // JVNDB: JVNDB-2006-000375 // CNNVD: CNNVD-200607-145 // NVD: CVE-2006-0026

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-0026
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#257164
value: 78.00

Trust: 0.8

CARNEGIE MELLON: VU#189140
value: 11.99

Trust: 0.8

CARNEGIE MELLON: VU#668564
value: 17.63

Trust: 0.8

CARNEGIE MELLON: VU#459388
value: 21.16

Trust: 0.8

CARNEGIE MELLON: VU#395588
value: 19.43

Trust: 0.8

CARNEGIE MELLON: VU#609868
value: 33.67

Trust: 0.8

CARNEGIE MELLON: VU#580036
value: 16.03

Trust: 0.8

CARNEGIE MELLON: VU#409316
value: 22.44

Trust: 0.8

CARNEGIE MELLON: VU#802324
value: 46.54

Trust: 0.8

NVD: CVE-2006-0026
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200607-145
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2006-0026
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#257164 // CERT/CC: VU#189140 // CERT/CC: VU#668564 // CERT/CC: VU#459388 // CERT/CC: VU#395588 // CERT/CC: VU#609868 // CERT/CC: VU#580036 // CERT/CC: VU#409316 // CERT/CC: VU#802324 // JVNDB: JVNDB-2006-000375 // CNNVD: CNNVD-200607-145 // NVD: CVE-2006-0026

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-0026

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 48187 // CNNVD: CNNVD-200607-145

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200607-145

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000375

PATCH

title:MS06-034url:http://www.microsoft.com/technet/security/bulletin/ms06-034.mspx

Trust: 0.8

title:MS06-034url:http://www.microsoft.com/japan/technet/security/bulletin/ms06-034.mspx

Trust: 0.8

sources: JVNDB: JVNDB-2006-000375

EXTERNAL IDS

db:CERT/CCid:VU#395588

Trust: 3.6

db:NVDid:CVE-2006-0026

Trust: 2.8

db:BIDid:18858

Trust: 2.7

db:USCERTid:TA06-192A

Trust: 2.5

db:SECUNIAid:21006

Trust: 2.4

db:SECTRACKid:1016466

Trust: 1.6

db:OSVDBid:27152

Trust: 1.6

db:VUPENid:ADV-2006-2752

Trust: 1.6

db:CERT/CCid:VU#257164

Trust: 0.9

db:CERT/CCid:VU#189140

Trust: 0.9

db:CERT/CCid:VU#668564

Trust: 0.9

db:CERT/CCid:VU#459388

Trust: 0.9

db:CERT/CCid:VU#609868

Trust: 0.9

db:CERT/CCid:VU#580036

Trust: 0.9

db:CERT/CCid:VU#409316

Trust: 0.9

db:SECUNIAid:20686

Trust: 0.9

db:CERT/CCid:VU#802324

Trust: 0.9

db:USCERTid:TA06-167A

Trust: 0.9

db:OSVDBid:26527

Trust: 0.8

db:BIDid:18422

Trust: 0.8

db:USCERTid:SA06-192A

Trust: 0.8

db:JVNDBid:JVNDB-2006-000375

Trust: 0.8

db:CNNVDid:CNNVD-200607-145

Trust: 0.6

db:PACKETSTORMid:48187

Trust: 0.1

db:PACKETSTORMid:47474

Trust: 0.1

sources: CERT/CC: VU#257164 // CERT/CC: VU#189140 // CERT/CC: VU#668564 // CERT/CC: VU#459388 // CERT/CC: VU#395588 // CERT/CC: VU#609868 // CERT/CC: VU#580036 // CERT/CC: VU#409316 // CERT/CC: VU#802324 // BID: 18858 // JVNDB: JVNDB-2006-000375 // PACKETSTORM: 48187 // PACKETSTORM: 47474 // CNNVD: CNNVD-200607-145 // NVD: CVE-2006-0026

REFERENCES

url:about vulnerability notes

Trust: 4.8

url:contact us about this vulnerability

Trust: 4.8

url:provide a vendor statement

Trust: 4.8

url:http://www.kb.cert.org/vuls/id/395588

Trust: 2.7

url:http://www.securityfocus.com/bid/18858

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta06-192a.html

Trust: 2.4

url:http://www.microsoft.com/technet/security/bulletin/ms06-035.mspx

Trust: 1.6

url:http://secunia.com/advisories/21006

Trust: 1.6

url:http://securitytracker.com/id?1016466

Trust: 1.6

url:http://archives.neohapsis.com/archives/bugtraq/2006-07/0316.html

Trust: 1.6

url:http://www.osvdb.org/27152

Trust: 1.6

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26796

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a435

Trust: 1.6

url:http://www.vupen.com/english/advisories/2006/2752

Trust: 1.6

url:http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx

Trust: 0.9

url:http://secunia.com/advisories/20686/

Trust: 0.9

url:http://www.microsoft.com/technet/security/bulletin/ms06-036.mspx

Trust: 0.8

url:http://www.faqs.org/rfcs/rfc2131.html

Trust: 0.8

url:http://www.tippingpoint.com/security/advisories/tsrt-06-02.html

Trust: 0.8

url:http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ipc/base/about_mailslots.asp

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms06-037.mspx

Trust: 0.8

url:http://www.microsoft.com/technet/security/advisory/921365.mspx

Trust: 0.8

url:http://securityresponse.symantec.com/avcenter/venc/data/trojan.mdropper.j.html

Trust: 0.8

url:http://www.securityfocus.com/bid/18422

Trust: 0.8

url:http://www.osvdb.org/displayvuln.php?osvdb_id=26527

Trust: 0.8

url:http://isc.sans.org/diary.php?storyid=1420

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0026

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/2752

Trust: 0.8

url:http://www.jpcert.or.jp/at/2006/at060010.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-192a/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-167a/

Trust: 0.8

url:http://jvn.jp/tr/trta06-192a/

Trust: 0.8

url:http://jvn.jp/tr/trta06-167a/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-0026

Trust: 0.8

url:http://secunia.com/advisories/21006/

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa06-192a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta06-167a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2006/20060621_110225.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2006/20060712_072107.html

Trust: 0.8

url:http://ruder.cdut.net/default.asp

Trust: 0.3

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms06-034.mspx

Trust: 0.3

url:/archive/1/440457

Trust: 0.3

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms06-jul>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0026

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/580036>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-1316

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/257164>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-1540

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-192a.html>

Trust: 0.1

url:https://update.microsoft.com/microsoftupdate>

Trust: 0.1

url:http://officeupdate.microsoft.com>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2372>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-167a.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/409316>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/609868>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms06-jul.mspx>

Trust: 0.1

url:http://www.microsoft.com/mac>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2372

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2389

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/459388>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0026>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/668564>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0007>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/189140>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-1314

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/802324>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1540>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1314>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2389>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1316>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3059

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0033>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3059>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/395588>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://secunia.com/product/23/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/2276/

Trust: 0.1

url:http://secunia.com/product/2275/

Trust: 0.1

url:http://secunia.com/product/4043/

Trust: 0.1

url:http://secunia.com/product/3054/

Trust: 0.1

url:http://secunia.com/product/24/

Trust: 0.1

url:http://secunia.com/product/4970/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/2278/

Trust: 0.1

url:http://secunia.com/product/2277/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#257164 // CERT/CC: VU#189140 // CERT/CC: VU#668564 // CERT/CC: VU#459388 // CERT/CC: VU#395588 // CERT/CC: VU#609868 // CERT/CC: VU#580036 // CERT/CC: VU#409316 // CERT/CC: VU#802324 // BID: 18858 // JVNDB: JVNDB-2006-000375 // PACKETSTORM: 48187 // PACKETSTORM: 47474 // CNNVD: CNNVD-200607-145 // NVD: CVE-2006-0026

CREDITS

Brett Moore brett.moore@SECURITY-ASSESSMENT.COM

Trust: 0.6

sources: CNNVD: CNNVD-200607-145

SOURCES

db:CERT/CCid:VU#257164
db:CERT/CCid:VU#189140
db:CERT/CCid:VU#668564
db:CERT/CCid:VU#459388
db:CERT/CCid:VU#395588
db:CERT/CCid:VU#609868
db:CERT/CCid:VU#580036
db:CERT/CCid:VU#409316
db:CERT/CCid:VU#802324
db:BIDid:18858
db:JVNDBid:JVNDB-2006-000375
db:PACKETSTORMid:48187
db:PACKETSTORMid:47474
db:CNNVDid:CNNVD-200607-145
db:NVDid:CVE-2006-0026

LAST UPDATE DATE

2024-09-17T19:49:02.580000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#257164date:2006-07-13T00:00:00
db:CERT/CCid:VU#189140date:2006-07-18T00:00:00
db:CERT/CCid:VU#668564date:2006-07-11T00:00:00
db:CERT/CCid:VU#459388date:2006-07-11T00:00:00
db:CERT/CCid:VU#395588date:2006-07-19T00:00:00
db:CERT/CCid:VU#609868date:2006-07-11T00:00:00
db:CERT/CCid:VU#580036date:2006-07-13T00:00:00
db:CERT/CCid:VU#409316date:2006-07-11T00:00:00
db:CERT/CCid:VU#802324date:2006-07-11T00:00:00
db:BIDid:18858date:2006-07-27T17:17:00
db:JVNDBid:JVNDB-2006-000375date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200607-145date:2020-11-24T00:00:00
db:NVDid:CVE-2006-0026date:2020-11-23T19:49:27.407

SOURCES RELEASE DATE

db:CERT/CCid:VU#257164date:2006-07-11T00:00:00
db:CERT/CCid:VU#189140date:2006-07-11T00:00:00
db:CERT/CCid:VU#668564date:2006-07-11T00:00:00
db:CERT/CCid:VU#459388date:2006-07-11T00:00:00
db:CERT/CCid:VU#395588date:2006-07-11T00:00:00
db:CERT/CCid:VU#609868date:2006-07-11T00:00:00
db:CERT/CCid:VU#580036date:2006-07-11T00:00:00
db:CERT/CCid:VU#409316date:2006-07-11T00:00:00
db:CERT/CCid:VU#802324date:2006-06-16T00:00:00
db:BIDid:18858date:2006-07-11T00:00:00
db:JVNDBid:JVNDB-2006-000375date:2007-04-01T00:00:00
db:PACKETSTORMid:48187date:2006-07-12T09:29:58
db:PACKETSTORMid:47474date:2006-06-17T01:13:40
db:CNNVDid:CNNVD-200607-145date:2006-07-11T00:00:00
db:NVDid:CVE-2006-0026date:2006-07-11T22:05:00