MS06-047: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (921645)

medium Nessus Plugin ID 22189

Synopsis

Arbitrary code can be executed on the remote host through VBA.

Description

The remote host is running a version of Microsoft Visual Basic for Applications that is vulnerable to a buffer overflow when handling malformed documents.

An attacker may exploit this flaw to execute arbitrary code on this host by sending a malformed file to a user of the remote host.

Solution

Microsoft has released a set of patches for Office.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-047

Plugin Details

Severity: Medium

ID: 22189

File Name: smb_nt_ms06-047.nasl

Version: 1.39

Type: local

Agent: windows

Published: 8/8/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:access, cpe:/a:microsoft:project, cpe:/a:microsoft:visio, cpe:/a:microsoft:works, cpe:/a:microsoft:visual_basic_software_development_kit

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/8/2006

Vulnerability Publication Date: 8/8/2006

Reference Information

CVE: CVE-2006-3649

BID: 19414

CERT: 159484

MSFT: MS06-047

MSKB: 921645