CVE-2006-1540 (CNNVD-200603-501)

CRITICAL 有利用代码
中文标题:
Microsoft Office畸形字符串解析整数溢出漏洞
英文标题:
MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers t...
CVSS分数: 9.3
发布时间: 2006-03-30 11:00:00
漏洞类型: 代码注入
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Microsoft Office是非常流行的办公软件套件。 Office所使用的一个共享库mso.dll存在内存破坏漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。 如果用户受骗打开了恶意的Office文档的话,就会触发数组索引边界错误,导致拒绝服务或执行任意指令。例如,攻击者可以创建特制的Excel 2003文件并将Unicode "Sheet Name"字符串的大小改为错误的值,这样就可以导致整数溢出。

英文描述:

MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll; (2) an Excel .xlw document, which triggers an access violation in excel.exe; (3) a Word document, which triggers an access violation in mso.dll in winword.exe; and (4) a PowerPoint document, which triggers an access violation in powerpnt.txt. NOTE: after the initial disclosure, this issue was demonstrated by triggering an integer overflow using an inconsistent size for a Unicode "Sheet Name" string.

CWE类型:
CWE-94
标签:
dos windows posidron OSVDB-27150 OSVDB-24595
受影响产品
厂商 产品 版本 版本范围 平台 CPE
microsoft office * - - cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoft office 2000 - - cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
microsoft office 2003 - - cpe:2.3:a:microsoft:office:2003:*:*:*:student_teacher:*:*:*
microsoft office 2004 - - cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*
microsoft office v.x - - cpe:2.3:a:microsoft:office:v.x:*:*:*:*:mac_os_x:*:*
microsoft office xp - - cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20060710 SYMSA-2006-007: Microsoft Office Malformed String Parsing Vulnerability mailing-list
cve.org
访问
21012 third-party-advisory
cve.org
访问
ADV-2006-2756 vdb-entry
cve.org
访问
MS06-038 vendor-advisory
cve.org
访问
VU#609868 third-party-advisory
cve.org
访问
office-string-parse-bo(27607) vdb-entry
cve.org
访问
office-property-string-bo(27609) vdb-entry
cve.org
访问
17252 vdb-entry
cve.org
访问
18889 vdb-entry
cve.org
访问
TA06-192A third-party-advisory
cve.org
访问
27150 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:639 vdb-entry
cve.org
访问
1615 exploit
cve.org
访问
1015855 vdb-entry
cve.org
访问
Download Exploit EDB-1615 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-1540 ADVISORY
cve.org
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2006-03-30 11:00:00
修改时间:
2024-08-07 17:19:47
创建时间:
2025-11-11 15:32:32
更新时间:
2025-11-11 16:10:39
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-1540 2025-11-11 15:17:40 2025-11-11 07:32:32
NVD nvd_CVE-2006-1540 2025-11-11 14:51:48 2025-11-11 07:41:18
CNNVD cnnvd_CNNVD-200603-501 2025-11-11 15:08:50 2025-11-11 07:49:05
EXPLOITDB exploitdb_EDB-1615 2025-11-11 15:05:50 2025-11-11 08:10:39
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:10:39
references_count: 14 → 16; tags_count: 0 → 5; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 14 -> 16
  • tags_count: 0 -> 5
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:05
vulnerability_type: 未提取 → 代码注入; cnnvd_id: 未提取 → CNNVD-200603-501; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码注入
  • cnnvd_id: 未提取 -> CNNVD-200603-501
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:18
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 6
  • data_sources: ['cve'] -> ['cve', 'nvd']