MS06-039: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution (915384)

Medium Nessus Plugin ID 22033


Arbitrary code can be executed on the remote host through the Microsoft Office filters.


The remote host is running a version of some Microsoft Office filters that are subject to various flaws which could allow arbitrary code to be run.

An attacker could use these to execute arbitrary code on this host.

To succeed, the attacker would have to send a rogue file to a user of the remote computer and have it import it with Microsoft Office.


Microsoft has released a set of patches for Office 2000, XP and 2003.

See Also

Plugin Details

Severity: Medium

ID: 22033

File Name: smb_nt_ms06-039.nasl

Version: $Revision: 1.34 $

Type: local

Agent: windows

Published: 2006/07/11

Modified: 2017/08/10

Dependencies: 13855, 57033

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:frontpage, cpe:/a:microsoft:onenote, cpe:/a:microsoft:project, cpe:/a:microsoft:works

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2006/07/11

Vulnerability Publication Date: 2006/07/11

Reference Information

CVE: CVE-2006-0033, CVE-2006-0007

BID: 18915, 18913

OSVDB: 27146, 27147

CERT: 459388, 668564

MSFT: MS06-039

MSKB: 915384

CWE: 119