CVE-2006-2492

Known Exploited Public Exploit

Description

Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 77.03% Top 5%
KEV Since 
Vendor Advisory microsoft.com Vendor Advisory secunia.com Vendor Advisory microsoft.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-027 patch vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2068 vdb entry signature broken link
http://isc.sans.org/diary.php?storyid=1345 exploit
http://www.osvdb.org/25635 vdb entry broken link
http://www.microsoft.com/technet/security/advisory/919637.mspx patch vendor advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1738 vdb entry signature broken link
http://isc.sans.org/diary.php?storyid=1346 exploit
http://www.us-cert.gov/cas/techalerts/TA06-164A.html us government resource third party advisory broken link
http://www.vupen.com/english/advisories/2006/1872 vdb entry broken link
http://www.securityfocus.com/bid/18037 patch vdb entry third party advisory broken link
http://secunia.com/advisories/20153 broken link third party advisory patch vendor advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26556 vdb entry third party advisory
http://www.kb.cert.org/vuls/id/446012 third party advisory us government resource
http://securitytracker.com/id?1016130 vdb entry third party advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1418 vdb entry signature broken link
http://www.us-cert.gov/cas/techalerts/TA06-139A.html us government resource third party advisory broken link
http://blogs.technet.com/msrc/archive/2006/05/19/429353.aspx broken link

Frequently Asked Questions

What is the severity of CVE-2006-2492?
CVE-2006-2492 has been scored as a high severity vulnerability.
How to fix CVE-2006-2492?
To fix CVE-2006-2492, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-2492 being actively exploited in the wild?
It is confirmed that CVE-2006-2492 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~77% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.