CVE-2006-4688
Microsoft Services - 'nwapi32.dll' (MS06-066)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability."
Desbordamiento de búfer en Client Service for NetWare (CSNW) en Microsoft Windows 2000 SP4, XP SP2, y Server 2003 hasta el SP1 permite a atacantes remotos ejecutar código de su elección mediante mensajes artesanales, también conocido como "Vulnerabilidad de corrupción de memoria en Client Service for NetWare".
A boundary error in Client Service for Netware (CSNW) can be exploited to cause a buffer overflow via a specially crafted network message sent to the system. Successful exploitation allows execution of arbitrary code and an attacker could remotely take complete control of the affected system. A denial of service vulnerability exists in Client Service for NetWare (CSNW) that could allow an attacker to send a specially crafted network message to an affected system running the Client Service for NetWare service. An attacker could cause the system to stop responding and automatically restart thus causing the affected system to stop accepting requests.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-09-11 CVE Reserved
- 2006-11-14 CVE Published
- 2009-11-26 First Exploit
- 2024-08-07 CVE Updated
- 2025-07-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1017224 | Vdb Entry | |
http://www.securityfocus.com/archive/1/451844/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/21023 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA06-318A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2006/4504 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29952 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A404 | Signature |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/83029 | 2009-11-26 | |
https://packetstorm.news/files/id/82941 | 2009-11-26 | |
https://www.exploit-db.com/exploits/16373 | 2011-03-07 | |
https://www.exploit-db.com/exploits/16369 | 2011-03-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/22866 | 2018-10-17 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4, fr |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | sp1 Search vendor "Microsoft" for product "Windows 2003 Server" and version "sp1" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|