ID CVE-2006-3440
Summary Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
    cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
  • cpe:2.3:o:microsoft:windows_2003_server:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:sp1
    cpe:2.3:o:microsoft:windows_2003_server:sp1
  • cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
    cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
  • cpe:2.3:o:microsoft:windows_xp:-:64-bit
    cpe:2.3:o:microsoft:windows_xp:-:64-bit
  • Microsoft windows xp_sp1 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc
  • Microsoft windows xp_sp2 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc
CVSS
Base: 10.0 (as of 10-08-2006 - 08:27)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description MS Windows DNS Resolution Remote Denial of Service PoC (MS06-041). CVE-2006-3440,CVE-2006-3441. Dos exploit for windows platform
id EDB-ID:2900
last seen 2016-01-31
modified 2006-12-09
published 2006-12-09
reporter Winny Thomas
source https://www.exploit-db.com/download/2900/
title Microsoft Windows - DNS Resolution - Remote Denial of Service PoC MS06-041
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS06-041.NASL
description The remote host is vulnerable to a buffer overrun in the DNS client service that could allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. To exploit this vulnerability, an attacker would need to set up a rogue DNS server to reply to the client with a specially crafted packet.
last seen 2019-02-21
modified 2018-11-15
plugin id 22183
published 2006-08-08
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=22183
title MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683)
oval via4
accepted 2011-05-09T04:01:47.560-04:00
class vulnerability
contributors
  • name Robert L. Hollis
    organization ThreatGuard, Inc.
  • name Shane Shaffer
    organization G2, Inc.
definition_extensions
  • comment Microsoft Windows 2000 SP4 or later is installed
    oval oval:org.mitre.oval:def:229
  • comment Microsoft Windows XP SP1 (32-bit) is installed
    oval oval:org.mitre.oval:def:1
  • comment Microsoft Windows XP SP2 or later is installed
    oval oval:org.mitre.oval:def:521
  • comment Microsoft Windows XP SP1 (64-bit) is installed
    oval oval:org.mitre.oval:def:480
  • comment Microsoft Windows Server 2003 (x86) Gold is installed
    oval oval:org.mitre.oval:def:165
  • comment Microsoft Windows Server 2003 SP1 (x86) is installed
    oval oval:org.mitre.oval:def:565
description Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
family windows
id oval:org.mitre.oval:def:747
status accepted
submitted 2006-08-11T12:53:40
title Winsock Hostname Vulnerability
version 68
refmap via4
bid 19319
cert TA06-220A
cert-vn VU#908276
ms MS06-041
sectrack 1016653
secunia 21394
vupen ADV-2006-3211
Last major update 07-03-2011 - 21:38
Published 08-08-2006 - 21:04
Last modified 12-10-2018 - 17:40
Back to Top