9.3
CVE-2006-0010
- EPSS 62.69%
- Veröffentlicht 10.01.2006 22:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 2000 Updatesp1
Microsoft ≫ Windows 2000 Updatesp2
Microsoft ≫ Windows 2000 Updatesp3
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows 2003 Server Versiondatacenter_64-bit Updatesp1
Microsoft ≫ Windows 2003 Server Versionenterprise Edition64-bit
Microsoft ≫ Windows 2003 Server Versionenterprise Updatesp1
Microsoft ≫ Windows 2003 Server Versionenterprise_64-bit
Microsoft ≫ Windows 2003 Server Versionenterprise_64-bit Updatesp1
Microsoft ≫ Windows 2003 Server Versionr2 Edition64-bit
Microsoft ≫ Windows 2003 Server Versionr2 Editiondatacenter_64-bit
Microsoft ≫ Windows 2003 Server Versionr2 Updatesp1
Microsoft ≫ Windows 2003 Server Versionstandard Edition64-bit
Microsoft ≫ Windows 2003 Server Versionstandard Updatesp1
Microsoft ≫ Windows 2003 Server Versionstandard_64-bit
Microsoft ≫ Windows 2003 Server Versionweb
Microsoft ≫ Windows 2003 Server Versionweb Updatesp1
Microsoft ≫ Windows 98 Updategold
Microsoft ≫ Windows Nt Version3.5.1
Microsoft ≫ Windows Nt Version3.5.1 Updatesp1
Microsoft ≫ Windows Nt Version3.5.1 Updatesp2
Microsoft ≫ Windows Nt Version3.5.1 Updatesp3
Microsoft ≫ Windows Nt Version3.5.1 Updatesp4
Microsoft ≫ Windows Nt Version3.5.1 Updatesp5
Microsoft ≫ Windows Nt Version3.5.1 Updatesp5 Editionalpha
Microsoft ≫ Windows Nt Version4.0
Microsoft ≫ Windows Nt Version4.0 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Editionserver
Microsoft ≫ Windows Nt Version4.0 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Editionterminal_server_alpha
Microsoft ≫ Windows Nt Version4.0 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp1
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp2
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp3
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp4
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp5
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp6
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp6a
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionalpha
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionworkstation
Microsoft ≫ Windows Xp Edition64-bit
Microsoft ≫ Windows Xp Editionhome
Microsoft ≫ Windows Xp Editionmedia_center
Microsoft ≫ Windows Xp Updategold Editionprofessional
Microsoft ≫ Windows Xp Updatesp1 Editionhome
Microsoft ≫ Windows Xp Updatesp1 Editionmedia_center
Microsoft ≫ Windows Xp Updatesp2 Editionhome
Microsoft ≫ Windows Xp Updatesp2 Editionmedia_center
Microsoft ≫ Windows Xp Updatesp2 Editiontablet_pc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 62.69% | 0.983 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.