Vulnerabilities > CVE-2006-3440 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 7 |
Exploit-Db
description | MS Windows DNS Resolution Remote Denial of Service PoC (MS06-041). CVE-2006-3440,CVE-2006-3441. Dos exploit for windows platform |
id | EDB-ID:2900 |
last seen | 2016-01-31 |
modified | 2006-12-09 |
published | 2006-12-09 |
reporter | Winny Thomas |
source | https://www.exploit-db.com/download/2900/ |
title | Microsoft Windows - DNS Resolution - Remote Denial of Service PoC MS06-041 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-041.NASL |
description | The remote host is vulnerable to a buffer overrun in the DNS client service that could allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. To exploit this vulnerability, an attacker would need to set up a rogue DNS server to reply to the client with a specially crafted packet. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22183 |
published | 2006-08-08 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22183 |
title | MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683) |
code |
|
Oval
accepted | 2011-05-09T04:01:47.560-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability." | ||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:747 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2006-08-11T12:53:40 | ||||||||||||||||||||||||
title | Winsock Hostname Vulnerability | ||||||||||||||||||||||||
version | 71 |
References
- http://secunia.com/advisories/21394
- http://secunia.com/advisories/21394
- http://securitytracker.com/id?1016653
- http://securitytracker.com/id?1016653
- http://www.kb.cert.org/vuls/id/908276
- http://www.kb.cert.org/vuls/id/908276
- http://www.securityfocus.com/bid/19319
- http://www.securityfocus.com/bid/19319
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.vupen.com/english/advisories/2006/3211
- http://www.vupen.com/english/advisories/2006/3211
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A747
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A747