First published: Tue Oct 10 2006(Updated: )
Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4692 is considered a high severity vulnerability due to its ability to allow remote attackers to execute arbitrary commands.
The recommended fix for CVE-2006-4692 is to apply available security updates for affected versions of Microsoft Windows or upgrade to newer versions.
CVE-2006-4692 affects Microsoft Windows XP SP1, SP2 and Windows Server 2003 SP1 and earlier.
CVE-2006-4692 is associated with remote user-assisted command execution attacks through crafted files.
An argument injection vulnerability like CVE-2006-4692 allows attackers to manipulate command line arguments to execute unauthorized commands on the system.