Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-10-15T14:16:30.576Z

Reserved: 2006-09-11T00:00:00

Link: CVE-2006-4692

cve-icon Vulnrichment

Updated: 2024-08-07T19:23:40.860Z

cve-icon NVD

Status : Deferred

Published: 2006-10-10T22:07:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2006-4692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.