← Zuruck zu CVEs
CVE-2006-0031
N/ABeschreibung
Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht3/14/2006
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
microsoft:office
Schwachen (CWE)
CWE-119
Referenzen
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/1521.html(secure@microsoft.com)
http://secunia.com/advisories/19138(secure@microsoft.com)
http://secunia.com/advisories/19238(secure@microsoft.com)
http://securityreason.com/securityalert/589(secure@microsoft.com)
http://securitytracker.com/id?1015766(secure@microsoft.com)
http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/104302(secure@microsoft.com)
http://www.osvdb.org/23902(secure@microsoft.com)
http://www.securityfocus.com/archive/1/427699/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/17101(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA06-073A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2006/0950(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25228(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1327(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1525(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1750(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A763(secure@microsoft.com)
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/1521.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19238(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/589(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015766(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/104302(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/23902(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/427699/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17101(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA06-073A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/0950(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25228(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1327(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1525(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1750(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A763(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.