7.9 High
AI Score
Confidence
Low
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.765 High
EPSS
Percentile
98.2%
Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a “/” (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka “Object Packager Dialogue Spoofing Vulnerability.”
CPE | Name | Operator | Version |
---|---|---|---|
microsoft:windows_xp | microsoft windows xp | eq | - |
microsoft:windows_server_2003 | microsoft windows server 2003 | eq | - |
secunia.com/advisories/20717
secunia.com/secunia_research/2006-54/advisory/
securitytracker.com/id?1017037
www.kb.cert.org/vuls/id/703936
www.osvdb.org/29424
www.securityfocus.com/archive/1/448273/100/0/threaded
www.securityfocus.com/archive/1/448696/100/0/threaded
www.securityfocus.com/archive/1/449179/100/0/threaded
www.securityfocus.com/bid/20318
www.vupen.com/english/advisories/2006/3984
docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A496