CVE-2006-3439
Microsoft Server Service - NetpwPathCanonicalize Overflow (MS06-040)
Severity Score
10.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
5
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
Desbordamiento de búfer en Server Service en Microsoft Windows 2000 SP4, XP SP1 y SP2, y Server 2003 SP1 permite a un atacante remoto, incluidos usuario anónimos, ejecutar código de su elección a través de mensajes RPC manipulados, una vulnerabilidad diferente que CVE-2006-1314.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-07-07 CVE Reserved
- 2006-08-09 CVE Published
- 2006-08-10 First Exploit
- 2024-01-01 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1016667 | Vdb Entry | |
http://www.dhs.gov/dhspublic/display?content=5789 | X_refsource_misc | |
http://www.securityfocus.com/bid/19409 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/3210 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28002 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A492 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16367 | 2011-02-17 | |
https://www.exploit-db.com/exploits/2223 | 2006-08-19 | |
https://www.exploit-db.com/exploits/2265 | 2006-08-28 | |
https://www.exploit-db.com/exploits/2162 | 2006-08-10 | |
https://www.exploit-db.com/exploits/2355 | 2006-09-13 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/21388 | 2018-10-12 | |
http://www.kb.cert.org/vuls/id/650769 | 2018-10-12 | |
http://www.us-cert.gov/cas/techalerts/TA06-220A.html | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4, fr |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | 64-bit Search vendor "Microsoft" for product "Windows 2003 Server" and version "64-bit" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | itanium Search vendor "Microsoft" for product "Windows 2003 Server" and version "itanium" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | r2 Search vendor "Microsoft" for product "Windows 2003 Server" and version "r2" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | sp1 Search vendor "Microsoft" for product "Windows 2003 Server" and version "sp1" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | sp1 Search vendor "Microsoft" for product "Windows 2003 Server" and version "sp1" | itanium |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | 64-bit |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp1, tablet_pc |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|