| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.7 | $0-$5k | 0.00 |
Summary
A vulnerability was found in CASIO Photo Loader up to 3.0. It has been rated as critical. The impacted element is an unknown function of the component ActiveX Control. Performing a manipulation results in memory corruption. This vulnerability is cataloged as CVE-2006-3893. There is no exploit available. Upgrading the affected component is advised.
Details
A vulnerability classified as critical has been found in CASIO Photo Loader up to 3.0. This affects an unknown function of the component ActiveX Control. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Multiple buffer overflows in the ActiveX controls in Newtone ImageKit 5 before Fix 30 and 6 before Fix 40, as used in CASIO Photo Loader software before 3.01 and possibly other software, allow remote attackers to execute arbitrary code via a crafted HTML document.
The weakness was shared 12/04/2006 by Will Dormann as confirmed advisory (CERT.org). It is possible to read the advisory at kb.cert.org. This vulnerability is uniquely identified as CVE-2006-3893 since 07/26/2006. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
It is declared as proof-of-concept.
Upgrading to version 3.01 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (30680), SecurityFocus (BID 21375†) and Secunia (SA23286†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 8.7
VulDB Base Score: 10.0
VulDB Temp Score: 8.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Photo Loader 3.01
Timeline
07/26/2006 🔍11/30/2006 🔍
12/04/2006 🔍
12/04/2006 🔍
12/08/2006 🔍
03/12/2015 🔍
11/24/2024 🔍
Sources
Advisory: kb.cert.orgResearcher: Will Dormann
Status: Confirmed
CVE: CVE-2006-3893 (🔍)
GCVE (CVE): GCVE-0-2006-3893
GCVE (VulDB): GCVE-100-33579
CERT: 🔍
X-Force: 30680 - Newtone ImageKit ActiveX controls multiple buffer overflows
SecurityFocus: 21375 - Newtone ImageKit ActiveX Multiple Unspecified Buffer Overflow Vulnerabilities
Secunia: 23286 - Newtone ImageKit ActiveX Control Unspecified Buffer Overflow, Highly Critical
Vupen: ADV-2006-4794
Entry
Created: 03/12/2015 22:21Updated: 11/24/2024 22:28
Changes: 03/12/2015 22:21 (55), 09/29/2017 09:02 (7), 11/24/2024 22:28 (16)
Complete: 🔍
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.