CVE-2006-0034
https://notcve.org/view.php?id=CVE-2006-0034
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0238.html http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0269.html http://secunia.com/advisories/20000 http://securityreason.com/securityalert/863 http://securitytracker.com/id?1016047 http://www.eeye.com/html/research/advisories/AD20060509a.html http://www.osvdb.org/25335 http://www.securityfocus.com/archive/1/433430/100/0/threaded http://www.securityfocus.com/archive/1/433677/100/0/threaded http://www.se • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-1591
https://notcve.org/view.php?id=CVE-2006-1591
Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file. desbordamiento de búfer basado en memoria dinámica (heap) en Microsoft Windows Help winhlp32.exe permite a los atacantes asistidos por el usuario ejecutar código arbitrario a través de datos de imagen incrustados creados en un archivo .hlp. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044748.html http://securityreason.com/securityalert/700 http://www.open-security.org/advisories/15 http://www.securityfocus.com/archive/1/430871/100/0/threaded http://www.securityfocus.com/bid/17325 https://exchange.xforce.ibmcloud.com/vulnerabilities/25573 •
CVE-2006-0988 – DNS Amplification Scanner
https://notcve.org/view.php?id=CVE-2006-0988
The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses. • http://dns.measurement-factory.com/surveys/sum1.html http://www.securityfocus.com/archive/1/426368/100/0/threaded http://www.us-cert.gov/reading_room/DNS-recursion121605.pdf - •
CVE-2006-0005 – Microsoft Windows Media Player - Plugin Overflow (MS06-006)
https://notcve.org/view.php?id=CVE-2006-0005
Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute. • https://www.exploit-db.com/exploits/1520 https://www.exploit-db.com/exploits/1505 https://www.exploit-db.com/exploits/1504 http://secunia.com/advisories/18852 http://securitytracker.com/id?1015628 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393 http://www.kb.cert.org/vuls/id/692060 http://www.securityfocus.com/bid/16644 http://www.us-cert.gov/cas/techalerts/TA06-045A.html http://www.vupen.com/english/advisories/2006/0575 https://docs.micr • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-0010
https://notcve.org/view.php?id=CVE-2006-0010
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression. Desbordamiento de búfer basado en memoria dinámica en T2EMBED.DLL en Microsoft Windows 2000 SP4, XP SP1 y SP2 y Server 2003 hasta la versión SP1, Windows 98 y Windows ME permite a atacantes remotos ejecutar código arbitrario a través de un mensajes de correo electrónico o una página web con una fuente web Embedded Open Type (EOT) manipulada que desencadena el desbordamiento durante la descompresión. • http://seclists.org/fulldisclosure/2006/Jan/363 http://secunia.com/advisories/18311 http://secunia.com/advisories/18365 http://secunia.com/advisories/18391 http://securitytracker.com/id?1015459 http://support.avaya.com/elmodocs2/security/ASA-2006-004.htm http://www.eeye.com/html/Research/Advisories/EEYEB20050801.html http://www.kb.cert.org/vuls/id/915930 http://www.osvdb.org/18829 http://www.securityfocus.com/archive/1/421885/100/0/threaded http://www.securityfocus.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •