CVE-2006-0002

N/A Unknown
Published: January 10, 2006 Modified: April 16, 2026
View on NVD

Description

Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/18368
Source: secure@microsoft.com
Patch Third Party Advisory
http://securityreason.com/securityalert/330
Source: secure@microsoft.com
Third Party Advisory
http://securityreason.com/securityalert/331
Source: secure@microsoft.com
Third Party Advisory
http://securitytracker.com/id?1015460
Source: secure@microsoft.com
Patch Third Party Advisory VDB Entry
http://securitytracker.com/id?1015461
Source: secure@microsoft.com
Patch Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-004.htm
Source: secure@microsoft.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/252146
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/421518/100/0/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/421520/100/0/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/16197
Source: secure@microsoft.com
Patch Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA06-010A.html
Source: secure@microsoft.com
Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0119
Source: secure@microsoft.com
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/22878
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://secunia.com/advisories/18368
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://securityreason.com/securityalert/330
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securityreason.com/securityalert/331
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015460
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://securitytracker.com/id?1015461
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-004.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/252146
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/421518/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/421520/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/16197
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA06-010A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0119
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22878
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1082
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1165
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1316
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1456
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1485
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A624
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
32.8%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft