CVE-2006-1510

Microsoft Windows XP SP2 ntdll.dll - Buffer Overflow

Title source: llm
STIX 2.1

Description

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Dinis Cruz · textdoswindows
https://www.exploit-db.com/exploits/27476

References (7)

Core 7
Core References
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17243
Exploit, Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19406
Exploit, Patch, Vendor Advisory mailing-list x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1113
Exploit, Patch x_refsource_misc
http://owasp.net/forums/234/showpost.aspx
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25439

Scores

EPSS 0.1323
EPSS Percentile 94.2%

Details

Status published
Products (2)
microsoft/.net_framework 1.0 (3 CPE variants)
microsoft/.net_framework 1.1 (2 CPE variants)
Published Mar 30, 2006
Tracked Since Feb 18, 2026