CVE-2006-2492

Known Exploited Public Exploit

Description

Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 77.03% Top 5%
KEV Since 
Vendor Advisory microsoft.com Vendor Advisory secunia.com Vendor Advisory microsoft.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-027 vendor advisory patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2068 broken link signature vdb entry
http://isc.sans.org/diary.php?storyid=1345 exploit
http://www.osvdb.org/25635 broken link vdb entry
http://www.microsoft.com/technet/security/advisory/919637.mspx vendor advisory patch broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1738 broken link signature vdb entry
http://isc.sans.org/diary.php?storyid=1346 exploit
http://www.us-cert.gov/cas/techalerts/TA06-164A.html us government resource broken link third party advisory
http://www.vupen.com/english/advisories/2006/1872 broken link vdb entry
http://www.securityfocus.com/bid/18037 broken link patch vdb entry third party advisory
http://secunia.com/advisories/20153 vendor advisory patch broken link third party advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26556 third party advisory vdb entry
http://www.kb.cert.org/vuls/id/446012 third party advisory us government resource
http://securitytracker.com/id?1016130 vdb entry broken link third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1418 broken link signature vdb entry
http://www.us-cert.gov/cas/techalerts/TA06-139A.html us government resource broken link third party advisory
http://blogs.technet.com/msrc/archive/2006/05/19/429353.aspx broken link

Frequently Asked Questions

What is the severity of CVE-2006-2492?
CVE-2006-2492 has been scored as a high severity vulnerability.
How to fix CVE-2006-2492?
To fix CVE-2006-2492, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-2492 being actively exploited in the wild?
It is confirmed that CVE-2006-2492 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~77% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.