Vulnerability Details : CVE-2006-6696
Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (CSRSS) process, which is not properly handled when invoking the UserHardError and GetHardErrorText functions in WINSRV.DLL.
Vulnerability category: OverflowMemory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2006-6696
Probability of exploitation activity in the next 30 days: 65.14%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-6696
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
[email protected] |
CWE ids for CVE-2006-6696
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2006-6696
-
http://blogs.technet.com/msrc/archive/2006/12/22/new-report-of-a-windows-vulnerability.aspx
-
http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html
-
http://research.eeye.com/html/alerts/zeroday/20061215.html
-
http://www.security.nnov.ru/files/messagebox.c
-
http://www.securityfocus.com/archive/1/455088/100/0/threaded
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051394.html
-
http://isc.sans.org/diary.php?n&storyid=1965
- http://www.vupen.com/english/advisories/2007/1325
-
http://www.securityfocus.com/bid/23324
-
http://securitytracker.com/id?1017433
-
http://www.vupen.com/english/advisories/2006/5120
-
http://www.securityfocus.com/archive/1/455158/100/0/threaded
- http://www.securityfocus.com/archive/1/466331/100/200/threaded
-
http://www.securityfocus.com/archive/1/455546/100/0/threaded
-
http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1816
-
http://www.securityfocus.com/archive/1/455104/100/0/threaded
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021
-
http://www.securityfocus.com/archive/1/455061/100/0/threaded
-
http://www.security.nnov.ru/Gnews944.html
-
http://www.kuban.ru/forum_new/forum2/files/19124.html
-
http://www.securityfocus.com/bid/21688
Products affected by CVE-2006-6696
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1_beta_1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:december_ctp:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*