MS06-073: Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)

Medium Nessus Plugin ID 23836


Arbitrary code can be executed on the remote host through the web browser.


The remote host is running a version of Microsoft Visual Studio 2005 that is vulnerable to a buffer overflow when handling malformed WMI request in the ActiveX component.

An attacker may exploit this flaw to execute arbitrary code on this host, by entice a use to visit a specially crafter web page.


Microsoft has released a set of patches for VS2005.

See Also

Plugin Details

Severity: Medium

ID: 23836

File Name: smb_nt_ms06-073.nasl

Version: $Revision: 1.33 $

Type: local

Agent: windows

Published: 2006/12/12

Modified: 2017/08/10

Dependencies: 57033, 13855

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/12/12

Vulnerability Publication Date: 2006/11/01

Exploitable With

Metasploit (MS06-014 Microsoft Internet Explorer COM CreateObject Code Execution)

Reference Information

CVE: CVE-2006-4704

BID: 20843

OSVDB: 30155

CERT: 854856

MSFT: MS06-073

MSKB: 925674