First published: Wed Apr 12 2006(Updated: )
Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Outlook Express | =6.0-sp1 | |
Microsoft Outlook Express | =5.5-sp1 | |
Microsoft Outlook Express | =5.5-sp2 | |
Microsoft Outlook Express | =6.0 | |
Microsoft Outlook Express | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0014 is considered to have a high severity due to its potential to allow remote code execution.
To mitigate CVE-2006-0014, users should upgrade to the latest version of Microsoft Outlook Express or apply any relevant security patches provided by Microsoft.
CVE-2006-0014 affects Microsoft Outlook Express versions 5.5 and 6.0, specifically SP1 and SP2 of 5.5 and all versions of 6.0.
CVE-2006-0014 exploits a buffer overflow vulnerability that could be triggered through a crafted Windows Address Book (WAB) file.
Yes, CVE-2006-0014 can lead to arbitrary code execution which may result in data loss or system compromise.