Zero-day vulnerability in Windows

Buffer overflow
CVE-2006-4868

This vulnerability was reported by Sunbelt Software.

Known malware:

Bloodhound.Exploit.78

Vulnerability details

Advisory: SB2006091902 - Remote code execution in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2006-4868

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-119 - Memory corruption

Description:

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to incorrect handling of input data in Vector Markup Language (VML) implementation (VGX.dll) in Microsoft Windows. A remote unauthenticated attacker can trick the victim to open a specially crafted web page or HTML file and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability is being actively exploited.

Public Exploits: