Vulnerability Description
Buffer overflow in Windows Explorer (explorer.exe) on Windows XP and 2003 allows user-assisted attackers to cause a denial of service (repeated crash) and possibly execute arbitrary code via a .url file with an InternetShortcut tag containing a long URL and a large number of "file:" specifiers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 2003 Server | 3.1.0.3270 |
| Microsoft | Windows Xp | All versions |
References
- http://securityreason.com/securityalert/1186
- http://www.securityfocus.com/archive/1/439153/100/0/threaded
- http://www.securityfocus.com/archive/1/439660/100/200/threaded
- http://www.securityfocus.com/bid/18838Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27567
- http://securityreason.com/securityalert/1186
- http://www.securityfocus.com/archive/1/439153/100/0/threaded
- http://www.securityfocus.com/archive/1/439660/100/200/threaded
- http://www.securityfocus.com/bid/18838Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27567
FAQ
What is CVE-2006-3351?
CVE-2006-3351 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Buffer overflow in Windows Explorer (explorer.exe) on Windows XP and 2003 allows user-assisted attackers to cause a denial of service (repeated crash) and possibly execute arbitrary code via a .url fi...
How severe is CVE-2006-3351?
CVE-2006-3351 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3351?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 2003 Server, Microsoft Windows Xp.