Vulnerability Description
Stack-based buffer overflow in the createPKCS10 function in Cryptomathic Cenroll ActiveX Control 1.1.0.0 allows remote attackers to execute arbitrary code via vectors related to the TDC Digital signature.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tdc | Cryptomathic Cenroll Activex Control | 1.1.0.0 |
References
- http://cirt.dk/advisories/cirt-43-advisory.pdfVendor Advisory
- http://secunia.com/advisories/19968PatchVendor Advisory
- http://securitytracker.com/id?1016034Patch
- http://www.kb.cert.org/vuls/id/548689US Government Resource
- http://www.osvdb.org/25282Patch
- http://www.securityfocus.com/archive/1/433079/100/0/threaded
- http://www.securityfocus.com/bid/17852Exploit
- http://www.vupen.com/english/advisories/2006/1675
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26255
- http://cirt.dk/advisories/cirt-43-advisory.pdfVendor Advisory
- http://secunia.com/advisories/19968PatchVendor Advisory
- http://securitytracker.com/id?1016034Patch
- http://www.kb.cert.org/vuls/id/548689US Government Resource
- http://www.osvdb.org/25282Patch
- http://www.securityfocus.com/archive/1/433079/100/0/threaded
FAQ
What is CVE-2006-1172?
CVE-2006-1172 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Stack-based buffer overflow in the createPKCS10 function in Cryptomathic Cenroll ActiveX Control 1.1.0.0 allows remote attackers to execute arbitrary code via vectors related to the TDC Digital signat...
How severe is CVE-2006-1172?
CVE-2006-1172 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1172?
Check the references section above for vendor advisories and patch information. Affected products include: Tdc Cryptomathic Cenroll Activex Control.