Vulnerability Details : CVE-2006-3445
Integer overflow in the ReadWideString function in agentdpv.dll in Microsoft Agent on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a large length value in an .ACF file, which results in a heap-based buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-3445
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3445
48.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3445
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-3445
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3445
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-068
-
http://www.vupen.com/english/advisories/2006/4506
Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA06-318A.html
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A154
-
http://www.securityfocus.com/archive/1/458558/100/0/threaded
-
http://securitytracker.com/id?1017222
-
http://www.securityfocus.com/bid/21034
-
http://www.coseinc.com/alert.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29945
-
http://www.kb.cert.org/vuls/id/810772
US Government Resource
Jump to