CVE-2006-2378
Severidad:
Pendiente de análisis
Type:
No Disponible / Otro tipo
Fecha de publicación:
13/06/2006
Última modificación:
23/07/2021
Descripción
*** Pendiente de traducción *** Buffer overflow in the ART Image Rendering component (jgdw400.dll) in Microsoft Windows XP SP1 and Sp2, Server 2003 SP1 and earlier, and Windows 98 and Me allows remote attackers to execute arbitrary code via a crafted ART image that causes heap corruption.
Impacto
Puntuación base 2.0
6.80
Severidad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/20605
- http://securitytracker.com/id?1016292=
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=407
- http://www.kb.cert.org/vuls/id/923236
- http://www.osvdb.org/26432
- http://www.securityfocus.com/bid/18394
- http://www.us-cert.gov/cas/techalerts/TA06-164A.html
- http://www.vupen.com/english/advisories/2006/2320
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26809
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1590
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1640
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1668
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1756
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1866