CVE-2006-4691
Microsoft Windows - 'NetpManageIPCConnect' Remote Stack Overflow (MS06-070)
Severity Score
10.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Desbordamiento de búfer basado en pila en la función NetpManageIPCConnect del servicio Workstation (wkssvc.dll) en Microsoft Windows 2000 SP4 y XP SP2 permite a atacantes remotos ejecutar código de su elección mediante mensajes RPC NetrJoinDomain2 con un nombre de anfitrión largo.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-09-11 CVE Reserved
- 2006-11-14 CVE Published
- 2006-11-16 First Exploit
- 2024-08-07 CVE Updated
- 2024-10-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://research.eeye.com/html/advisories/published/AD20061114.html | Third Party Advisory | |
http://securitytracker.com/id?1017221 | Vdb Entry | |
http://www.kb.cert.org/vuls/id/778036 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/451588/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/20985 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA06-318A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2006/4508 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29948 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A607 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/2809 | 2006-11-18 | |
https://www.exploit-db.com/exploits/2789 | 2006-11-16 | |
https://www.exploit-db.com/exploits/2800 | 2006-11-17 | |
https://www.exploit-db.com/exploits/16372 | 2010-10-05 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/22883 | 2018-10-17 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4, fr |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|