CVE-2006-0013
Published Feb 14, 2006
Last updated 6 years ago
Overview
- Description
- Buffer overflow in the Web Client service (WebClnt.dll) for Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote authenticated users or Guests to execute arbitrary code via crafted RPC requests, a different vulnerability than CVE-2005-1207.
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE3DF901-734B-4956-9D22-FE4608A31DDA" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E69D0E21-8C62-403E-8097-2CA403CBBB1B" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A86C732B-6E92-46FB-B1E5-F0BA2F0D6D82" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B127407D-AE50-4AFE-A780-D85B5AF44A2D" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "986AE140-316D-4874-AEE2-3058A007D33F" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D42E51C-740A-4441-8BAF-D073111B984C" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34ACB544-87DD-4D9A-99F0-A10F48C1EE05" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1BC59CF-BA8A-4D4C-92A5-CFDA7ECD685F" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74AD256D-4BCE-41FB-AD73-C5C63A59A06D" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B5F54BB-A80E-42F2-A700-82C1240E23D0" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3AC387D-BB23-4EB9-A7DA-6E3F5CD8EFD7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B518E945-5FDE-4A37-878D-6946653C91F7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76BDFB16-D71F-4E33-83FD-F0F2AE2FAE7F" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1" } ], "operator": "OR" } ] } ]