First published: Tue Sep 19 2006(Updated: )
Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =gold | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =6.0 | |
Microsoft Outlook | =2003 | |
Internet Explorer | =5.0.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4868 is considered critical due to the potential for remote code execution via specially crafted VML files.
To mitigate CVE-2006-4868, users should apply the latest security patches from Microsoft for affected versions of Windows and software.
CVE-2006-4868 affects Microsoft Internet Explorer 6.0 and Microsoft Outlook 2003 primarily on Windows XP SP2.
Yes, CVE-2006-4868 can be exploited remotely by submitting a malicious VML file to the target system.
CVE-2006-4868 is a stack-based buffer overflow vulnerability in the Vector Graphics Rendering engine.