Vulnerability Details : CVE-2006-6456
Unspecified vulnerability in Microsoft Word 2000, 2002, and 2003 and Word Viewer 2003 allows remote attackers to execute code via unspecified vectors related to malformed data structures that trigger memory corruption, a different vulnerability than CVE-2006-5994.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2006-6456
- cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2006:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:works:2005:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6456
96.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6456
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2006-6456
-
http://vil.mcafeesecurity.com/vil/content/v_vul27249.htm
Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA07-044A.html
US Government Resource
-
http://isc.sans.org/diary.php?storyid=1925
Vendor Advisory
-
http://vil.mcafeesecurity.com/vil/content/v_141056.htm
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30806
-
http://www.vupen.com/english/advisories/2006/4920
-
http://www.securityfocus.com/bid/21518
-
http://www.securityfocus.com/archive/1/454069/100/0/threaded
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0199.html
-
http://www.securityfocus.com/archive/1/454093/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A746
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014
-
http://www.kb.cert.org/vuls/id/166700
Third Party Advisory;US Government Resource
-
http://securitytracker.com/id?1017579
-
http://securitytracker.com/id?1017358
-
http://blogs.technet.com/msrc/archive/2006/12/10/new-report-of-a-word-zero-day.aspx
Vendor Advisory
-
http://www.securityfocus.com/archive/1/454072/100/0/threaded
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0215.html
-
http://www.vupen.com/english/advisories/2007/0435
Jump to