Description
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Exploits (1)
References (7)
Core 7
Core References
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17243
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19406
Exploit, Patch, Vendor Advisory mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html
Exploit x_refsource_misc
http://owasp.net/forums/257/showpost.aspx
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1113
Exploit, Patch x_refsource_misc
http://owasp.net/forums/234/showpost.aspx
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25439
Scores
EPSS
0.1323
EPSS Percentile
94.2%
Details
Status
published
Products (2)
microsoft/.net_framework
1.0 (3 CPE variants)
microsoft/.net_framework
1.1 (2 CPE variants)
Published
Mar 30, 2006
Tracked Since
Feb 18, 2026