CVE-2006-4692

N/A Unknown
Published: October 10, 2006 Modified: April 23, 2026
View on NVD

Description

Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/20717
Source: secure@microsoft.com
Broken Link Vendor Advisory
http://secunia.com/secunia_research/2006-54/advisory/
Source: secure@microsoft.com
Broken Link Vendor Advisory
http://securitytracker.com/id?1017037
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/703936
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.osvdb.org/29424
Source: secure@microsoft.com
Broken Link
http://www.securityfocus.com/archive/1/448273/100/0/threaded
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/448696/100/0/threaded
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/449179/100/0/threaded
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20318
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/3984
Source: secure@microsoft.com
Broken Link Vendor Advisory
http://secunia.com/advisories/20717
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/secunia_research/2006-54/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://securitytracker.com/id?1017037
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/703936
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/29424
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/448273/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/448696/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/449179/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20318
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/3984
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft