Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-1510
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-30 Mar, 2006 | 01:06
Updated At-03 Apr, 2025 | 01:03

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

Microsoft Corporation
microsoft
>>.net_framework>>1.0
cpe:2.3:a:microsoft:.net_framework:1.0:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>.net_framework>>1.0
cpe:2.3:a:microsoft:.net_framework:1.0:sp1:sdk:*:*:*:*:*
Microsoft Corporation
microsoft
>>.net_framework>>1.0
cpe:2.3:a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:*
Microsoft Corporation
microsoft
>>.net_framework>>1.1
cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>.net_framework>>1.1
cpe:2.3:a:microsoft:.net_framework:1.1:sp1:sdk:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Succesful exploitation can only occur when ntdll.dll system library is used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK packages.

Vendor Statements

References
HyperlinkSourceResource
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.htmlcve@mitre.org
Exploit
Patch
Vendor Advisory
http://owasp.net/forums/234/showpost.aspxcve@mitre.org
Exploit
Patch
http://owasp.net/forums/257/showpost.aspxcve@mitre.org
Exploit
http://secunia.com/advisories/19406cve@mitre.org
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/17243cve@mitre.org
Exploit
Patch
http://www.vupen.com/english/advisories/2006/1113cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/25439cve@mitre.org
N/A
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://owasp.net/forums/234/showpost.aspxaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://owasp.net/forums/257/showpost.aspxaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/19406af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/17243af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.vupen.com/english/advisories/2006/1113af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/25439af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html
Source: cve@mitre.org
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://owasp.net/forums/234/showpost.aspx
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: http://owasp.net/forums/257/showpost.aspx
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://secunia.com/advisories/19406
Source: cve@mitre.org
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/17243
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/1113
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25439
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://owasp.net/forums/234/showpost.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://owasp.net/forums/257/showpost.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://secunia.com/advisories/19406
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/17243
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/1113
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25439
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found