Vulnerability Details : CVE-2006-6696
Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (CSRSS) process, which is not properly handled when invoking the UserHardError and GetHardErrorText functions in WINSRV.DLL.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2006-6696
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:december_ctp:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6696
57.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6696
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2006-6696
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-6696
-
http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx
-
http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html
-
http://research.eeye.com/html/alerts/zeroday/20061215.html
-
http://www.security.nnov.ru/files/messagebox.c
-
http://www.securityfocus.com/archive/1/455088/100/0/threaded
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html
-
http://isc.sans.org/diary.php?n&storyid=1965
-
http://www.vupen.com/english/advisories/2007/1325
-
http://www.securityfocus.com/bid/23324
-
http://securitytracker.com/id?1017433
-
http://www.vupen.com/english/advisories/2006/5120
-
http://www.securityfocus.com/archive/1/455158/100/0/threaded
-
http://www.securityfocus.com/archive/1/466331/100/200/threaded
-
http://www.securityfocus.com/archive/1/455546/100/0/threaded
-
http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816
-
http://www.securityfocus.com/archive/1/455104/100/0/threaded
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021
-
http://www.securityfocus.com/archive/1/455061/100/0/threaded
-
http://www.security.nnov.ru/Gnews944.html
-
http://www.kuban.ru/forum_new/forum2/files/19124.html
-
http://www.securityfocus.com/bid/21688
Jump to