{"vuid":"VU#927548","idnumber":"927548","name":"Microsoft Management Console cross-site scripting vulnerability","keywords":["Microsoft","Windows","Management Console","MMC","remote code execution","embedded resource file","ms06-aug"],"overview":"Microsoft Management Console (MMC) is vulnerable to cross-site scripting, which may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"MMC MMC is an application that allows a user to perform administrative tasks. Through the use of various snap-ins, MMC can be used to configure Windows services, local users and groups, storage devices, and more. The problem HTML files in the MMC library can be directly referenced by Internet Explorer. This can cause a cross-site scripting vulnerability from other zones into the Local Machine Zone.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user.","resolution":"Apply an update\nThis vulnerability is addressed in Microsoft Security Bulletin MS06-044.","workarounds":"Workarounds Microsoft has provided several workarounds in Microsoft Security Bulletin MS06-044.","sysaffected":"","thanks":"This vulnerability was reported by Microsoft, who in turn credit Yorick Koster of ITsec Security Services, H D Moore, and Tom Gilder.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-044.mspx","http://www.microsoft.com/technet/prodtechnol/windows2000serv/howto/mmcsteps.mspx"],"cveids":["CVE-2006-3643"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-08T17:42:53Z","publicdate":"2006-08-08T00:00:00Z","datefirstpublished":"2006-08-08T20:13:08Z","dateupdated":"2006-08-08T20:13:16Z","revision":4,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"18","cam_scorecurrent":"17.01","cam_scorecurrentwidelyknown":"17.01","cam_scorecurrentwidelyknownexploited":"29.16","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.15,"vulnote":null}