MS06-073: Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)

medium Nessus Plugin ID 23836

Synopsis

Arbitrary code can be executed on the remote host through the web browser.

Description

The remote host is running a version of Microsoft Visual Studio 2005 that is vulnerable to a buffer overflow when handling malformed WMI request in the ActiveX component.

An attacker may exploit this flaw to execute arbitrary code on this host, by entice a use to visit a specially crafter web page.

Solution

Microsoft has released a set of patches for VS2005.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-073

Plugin Details

Severity: Medium

ID: 23836

File Name: smb_nt_ms06-073.nasl

Version: 1.35

Type: local

Agent: windows

Published: 12/12/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.5

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/12/2006

Vulnerability Publication Date: 11/1/2006

Exploitable With

Metasploit (MS06-014 Microsoft Internet Explorer COM CreateObject Code Execution)

Reference Information

CVE: CVE-2006-4704

BID: 20843

CERT: 854856

MSFT: MS06-073

MSKB: 925674