CVE-2006-0009

N/A Unknown
Published: March 14, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://blogs.securiteam.com/?author=28
Source: secure@microsoft.com
http://blogs.securiteam.com/?p=557
Source: secure@microsoft.com
http://blogs.securiteam.com/?p=559
Source: secure@microsoft.com
http://secunia.com/advisories/19138
Source: secure@microsoft.com
Patch Vendor Advisory
http://secunia.com/advisories/19238
Source: secure@microsoft.com
http://securitytracker.com/id?1015766
Source: secure@microsoft.com
Patch
http://securitytracker.com/id?1016720
Source: secure@microsoft.com
http://securitytracker.com/id?1016886
Source: secure@microsoft.com
http://www.kb.cert.org/vuls/id/682820
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.osvdb.org/23903
Source: secure@microsoft.com
http://www.securityfocus.com/bid/17000
Source: secure@microsoft.com
Patch
http://www.securityfocus.com/bid/20059
Source: secure@microsoft.com
http://www.us-cert.gov/cas/techalerts/TA06-073A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://blogs.securiteam.com/?author=28
Source: af854a3a-2127-422b-91ae-364da2661108
http://blogs.securiteam.com/?p=557
Source: af854a3a-2127-422b-91ae-364da2661108
http://blogs.securiteam.com/?p=559
Source: af854a3a-2127-422b-91ae-364da2661108
http://isc.sans.org/diary.php?storyid=1618
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19138
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19238
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015766
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://securitytracker.com/id?1016720
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016886
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-069.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.darkreading.com/document.asp?doc_id=101970
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/682820
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/23903
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/427671/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/432004/30/5340/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443890/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/444051/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446370/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446425/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17000
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/20059
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.symantec.com/enterprise/research/SYMSA-2006-001.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA06-073A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0950
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3678
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/25009
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/29009
Source: af854a3a-2127-422b-91ae-364da2661108

72 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
41.4%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft