Vulnerability Details : CVE-2006-0564
Public exploit exists!
Stack-based buffer overflow in Microsoft HTML Help Workshop 4.74.8702.0, and possibly earlier versions, and as included in the Microsoft HTML Help 1.4 SDK, allows context-dependent attackers to execute arbitrary code via a .hhp file with a long Contents file field.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-0564
- cpe:2.3:a:microsoft:html_help:1.4:*:sdk:*:*:*:*:*
- cpe:2.3:a:microsoft:html_help_workshop:4.74.8702.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0564
72.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-0564
-
HTML Help Workshop 4.74 (hhp Project File) Buffer Overflow
Disclosure Date: 2006-02-06First seen: 2020-04-26exploit/windows/fileformat/hhw_hhp_compiledfile_bofThis module exploits a stack buffer overflow in HTML Help Workshop 4.74 By creating a specially crafted hhp file, an attacker may be able to execute arbitrary code. Authors: - bratax - jduck <jduck@metasploit.com> -
HTML Help Workshop 4.74 (hhp Project File) Buffer Overflow
Disclosure Date: 2006-02-06First seen: 2020-04-26exploit/windows/fileformat/hhw_hhp_contentfile_bofThis module exploits a stack buffer overflow in HTML Help Workshop 4.74 by creating a specially crafted hhp file. Authors: - bratax - jduck <jduck@metasploit.com>
CVSS scores for CVE-2006-0564
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-0564
-
http://securitytracker.com/id?1015585
-
http://secunia.com/advisories/18740
Vendor Advisory
-
http://www.osvdb.org/22941
-
http://users.pandora.be/bratax/advisories/b008.html
-
http://www.kb.cert.org/vuls/id/124460
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24481
-
http://www.vupen.com/english/advisories/2006/0446
Jump to