MS06-073: Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)

medium Nessus Plugin ID 23836


Arbitrary code can be executed on the remote host through the web browser.


The remote host is running a version of Microsoft Visual Studio 2005 that is vulnerable to a buffer overflow when handling malformed WMI request in the ActiveX component.

An attacker may exploit this flaw to execute arbitrary code on this host, by entice a use to visit a specially crafter web page.


Microsoft has released a set of patches for VS2005.

See Also

Plugin Details

Severity: Medium

ID: 23836

File Name: smb_nt_ms06-073.nasl

Version: 1.35

Type: local

Agent: windows

Published: 12/12/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 8.5


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/12/2006

Vulnerability Publication Date: 11/1/2006

Exploitable With

Metasploit (MS06-014 Microsoft Internet Explorer COM CreateObject Code Execution)

Reference Information

CVE: CVE-2006-4704

BID: 20843

CERT: 854856

MSFT: MS06-073

MSKB: 925674