7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.635 Medium
EPSS
Percentile
97.9%
A buffer overflow in Microsoft HTML Help Workshop may allow a remote attacker to execute arbitrary code on a vulnerable system.
Microsoft HTML Help provides a standard help system for the Windows operating system. HTML Help Workshop is a component of the software development kit for HTML Help. A lack of validation on the Contents file
field within HTML Help Workshop Project files headers may allow a stack-based buffer overflow to occur. Note that Microsoft HTML Help Workshop is not installed by default on any version of Microsoft Windows.
Exploit code for this vulnerability is publicly available.
By persuading a user to access a specially crafted HTML Help Workshop Project files (.hhp), a remote attacker may be able to execute arbitrary code.
We are unaware of a practical solution to this problem, however we suggest the following workaround to reduce the chances of exploitation:
Do not access HTML Help Workshop Project files from untrusted sources
Exploitation occurs if a user has the HTML Help SDK installed and accesses a specially crafted HTML Help Workshop Project file. By only accessing Help Workshop Project files from known and trusted sources, the chances of exploitation are reduced.
124460
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 13, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by bratax.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-0564 |
---|---|
Severity Metric: | 17.08 Date Public: |