First published: Thu Jul 06 2006(Updated: )
Buffer overflow in Windows Explorer (explorer.exe) on Windows XP and 2003 allows user-assisted attackers to cause a denial of service (repeated crash) and possibly execute arbitrary code via a .url file with an InternetShortcut tag containing a long URL and a large number of "file:" specifiers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2003 Server | =enterprise_edition_64-bit-sp1 | |
Microsoft Windows 2003 Server | =64-bit | |
Microsoft Windows 2003 Server | =datacenter_edition_64-bit-sp1 | |
Microsoft Windows 2003 Server | =itanium | |
Microsoft Windows 2003 Server | =web-sp1_beta_1 | |
Microsoft Windows 2003 Server | =datacenter_edition-sp1_beta_1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows XP | ||
Microsoft Windows XP | =ibm_oem_version-sp1 | |
Microsoft Windows 2003 Server | =datacenter_edition_64-bit | |
Microsoft Windows 2003 Server | =enterprise_64-bit | |
Microsoft Windows 2003 Server | =enterprise-sp1_beta_1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows XP | ||
Microsoft Windows 2003 Server | =standard_64-bit | |
Microsoft Windows 2003 Server | =datacenter_64-bit-sp1 | |
Microsoft Windows 2003 Server | =enterprise_edition_64-bit | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2003 Server | =datacenter_edition_64-bit-sp1_beta_1 | |
Microsoft Windows 2003 Server | =datacenter_64-bit-sp1_beta_1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =standard-sp1_beta_1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =r2-sp1 | |
Microsoft Windows 2003 Server | =enterprise_64-bit-sp1 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2003 Server | =3.1.0.3270 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =r2-sp1_beta_1 | |
Microsoft Windows 2003 Server | =web-sp1 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows XP | =ibm_oem_version | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows 2003 Server | =enterprise_edition-sp1 | |
Microsoft Windows 2003 Server | =standard-sp1 | |
Microsoft Windows 2003 Server | =enterprise-sp1 | |
Microsoft Windows 2003 Server | =enterprise_edition_64-bit-sp1_beta_1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2003 Server | =enterprise_edition-sp1_beta_1 | |
Microsoft Windows 2003 Server | =enterprise_64-bit-sp1_beta_1 | |
Microsoft Windows 2003 Server | =datacenter_edition | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2003 Server | =datacenter_edition-sp1 | |
Microsoft Windows XP | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.