9.3

CVE-2006-0010

Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 2000 Updatesp1
MicrosoftWindows 2000 Updatesp2
MicrosoftWindows 2000 Updatesp3
MicrosoftWindows 2000 Updatesp4
MicrosoftWindows 2003 Server Versiondatacenter_64-bit Updatesp1
MicrosoftWindows 2003 Server Versionenterprise Edition64-bit
MicrosoftWindows 2003 Server Versionenterprise Updatesp1
MicrosoftWindows 2003 Server Versionenterprise_64-bit
MicrosoftWindows 2003 Server Versionenterprise_64-bit Updatesp1
MicrosoftWindows 2003 Server Versionr2 Edition64-bit
MicrosoftWindows 2003 Server Versionr2 Editiondatacenter_64-bit
MicrosoftWindows 2003 Server Versionr2 Updatesp1
MicrosoftWindows 2003 Server Versionstandard Edition64-bit
MicrosoftWindows 2003 Server Versionstandard Updatesp1
MicrosoftWindows 2003 Server Versionstandard_64-bit
MicrosoftWindows 2003 Server Versionweb Updatesp1
MicrosoftWindows 98 Updategold
MicrosoftWindows Nt Version3.5.1
MicrosoftWindows Nt Version3.5.1 Updatesp1
MicrosoftWindows Nt Version3.5.1 Updatesp2
MicrosoftWindows Nt Version3.5.1 Updatesp3
MicrosoftWindows Nt Version3.5.1 Updatesp4
MicrosoftWindows Nt Version3.5.1 Updatesp5
MicrosoftWindows Nt Version3.5.1 Updatesp5 Editionalpha
MicrosoftWindows Nt Version4.0
MicrosoftWindows Nt Version4.0 Editionalpha
MicrosoftWindows Nt Version4.0 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Editionserver
MicrosoftWindows Nt Version4.0 Editionterminal_server
MicrosoftWindows Nt Version4.0 Editionterminal_server_alpha
MicrosoftWindows Nt Version4.0 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp1
MicrosoftWindows Nt Version4.0 Updatesp1 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp1 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp1 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp1 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp1 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp2
MicrosoftWindows Nt Version4.0 Updatesp2 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp2 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp2 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp2 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp2 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp3
MicrosoftWindows Nt Version4.0 Updatesp3 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp3 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp3 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp3 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp3 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp4
MicrosoftWindows Nt Version4.0 Updatesp4 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp4 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp4 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp4 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp4 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp5
MicrosoftWindows Nt Version4.0 Updatesp5 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp5 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp5 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp5 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp5 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp6
MicrosoftWindows Nt Version4.0 Updatesp6 Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp6 Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp6 Editionserver
MicrosoftWindows Nt Version4.0 Updatesp6 Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp6 Editionworkstation
MicrosoftWindows Nt Version4.0 Updatesp6a
MicrosoftWindows Nt Version4.0 Updatesp6a Editionalpha
MicrosoftWindows Nt Version4.0 Updatesp6a Editionenterprise_server
MicrosoftWindows Nt Version4.0 Updatesp6a Editionserver
MicrosoftWindows Nt Version4.0 Updatesp6a Editionterminal_server
MicrosoftWindows Nt Version4.0 Updatesp6a Editionworkstation
MicrosoftWindows Xp Edition64-bit
MicrosoftWindows Xp Editionhome
MicrosoftWindows Xp Editionmedia_center
MicrosoftWindows Xp Updategold Editionprofessional
MicrosoftWindows Xp Updatesp1 Editionhome
MicrosoftWindows Xp Updatesp1 Editionmedia_center
MicrosoftWindows Xp Updatesp2 Editionhome
MicrosoftWindows Xp Updatesp2 Editionmedia_center
MicrosoftWindows Xp Updatesp2 Editiontablet_pc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 62.69% 0.983
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://www.kb.cert.org/vuls/id/915930
Third Party Advisory
US Government Resource