Описание
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-1510
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25439
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html
- http://owasp.net/forums/234/showpost.aspx
- http://owasp.net/forums/257/showpost.aspx
- http://secunia.com/advisories/19406
- http://www.securityfocus.com/bid/17243
- http://www.vupen.com/english/advisories/2006/1113
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
EPSS