First published: Tue Mar 07 2006(Updated: )
Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio | =6.0-sp5 | |
Microsoft Visual Studio | =6.0 | |
Microsoft Visual Studio | =6.0-sp3 | |
Microsoft Visual Studio | =6.0-sp2 | |
Microsoft Visual Interdev | =6.0 | |
Microsoft Visual Studio | =6.0-sp1 | |
Microsoft Visual Studio | =6.0-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1043 is considered high severity due to the potential for remote code execution.
To mitigate CVE-2006-1043, it is recommended to upgrade to a later version of Microsoft Visual Studio that is not affected.
CVE-2006-1043 affects Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0, including all service packs.
CVE-2006-1043 can enable user-assisted attackers to execute arbitrary code through crafted project files.
CVE-2006-1043 is an old vulnerability, but if using the affected versions of the software, it may still be exploitable.