Vulnerability Details : CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Products affected by CVE-2006-0525
- cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:version_cue:gold:*:mac_os_x:*:*:*:*:*
- cpe:2.3:a:adobe:version_cue:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:version_cue:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:creative_suite:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:creative_suite:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:creative_suite:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:photoshop:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:photoshop:9.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:photoshop:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:photoshop:le:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:premiere:1.5:*:pro:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:cs:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:cs3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:illustrator:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:indesign:cs:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:indesign:cs3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:pagemaker:6.5:*:plus:*:*:*:*:*
- cpe:2.3:a:adobe:pagemaker:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:pagemaker:7.0:*:plus:*:*:*:*:*
- cpe:2.3:a:adobe:pagemaker:6.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0525
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0525
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2006-0525
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-0525
-
http://securitytracker.com/id?1015577
-
http://www.adobe.com/support/techdocs/332644.html
-
http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf
-
http://securitytracker.com/id?1015578
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24464
-
http://www.securityfocus.com/archive/1/423587/100/0/threaded
-
http://www.kb.cert.org/vuls/id/953860
Third Party Advisory;US Government Resource
-
http://www.vupen.com/english/advisories/2006/0431
Vendor Advisory
-
http://securitytracker.com/id?1015579
-
http://www.securityfocus.com/bid/16451
Jump to