Vulnerabilities > CVE-2006-4688 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Exploit-Db
description Microsoft Services MS06-066 nwwks.dll. CVE-2006-4688. Remote exploit for windows platform id EDB-ID:16369 last seen 2016-02-01 modified 2010-05-09 published 2010-05-09 reporter metasploit source https://www.exploit-db.com/download/16369/ title Microsoft Services - nwwks.dll MS06-066 description Microsoft Services MS06-066 nwapi32.dll. CVE-2006-4688. Remote exploit for windows platform id EDB-ID:16373 last seen 2016-02-01 modified 2010-08-25 published 2010-08-25 reporter metasploit source https://www.exploit-db.com/download/16373/ title Microsoft Services - nwapi32.dll MS06-066
Metasploit
description This module exploits a stack buffer overflow in the svchost service, when the netware client service is running. This specific vulnerability is in the nwapi32.dll module. id MSF:EXPLOIT/WINDOWS/SMB/MS06_066_NWWKS last seen 2020-06-13 modified 2017-07-24 published 2006-11-15 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4688 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/smb/ms06_066_nwwks.rb title MS06-066 Microsoft Services nwwks.dll Module Exploit description This module exploits a stack buffer overflow in the svchost service when the netware client service is running. This specific vulnerability is in the nwapi32.dll module. id MSF:EXPLOIT/WINDOWS/SMB/MS06_066_NWAPI last seen 2020-04-17 modified 2017-07-24 published 2006-11-15 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4688 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/smb/ms06_066_nwapi.rb title MS06-066 Microsoft Services nwapi32.dll Module Exploit
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-066.NASL |
description | The remote host contains a version of the Client Service for NetWare that is vulnerable to a buffer overflow. An attacker may exploit this to cause a denial of service by sending a malformed IPX packet to the remote host, or to execute arbitrary code by exploiting a flaw in the NetWare client. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23643 |
published | 2006-11-14 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23643 |
title | MS06-066: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution (923980) |
code |
|
Oval
accepted | 2007-02-20T13:40:29.545-05:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability." | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:404 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2006-11-15T12:28:05 | ||||||||||||||||
title | Microsoft Client Service for NetWare Memory Corruption Vulnerability | ||||||||||||||||
version | 41 |
Packetstorm
data source https://packetstormsecurity.com/files/download/83029/ms06_066_nwwks.rb.txt id PACKETSTORM:83029 last seen 2016-12-05 published 2009-11-26 reporter Pusscat source https://packetstormsecurity.com/files/83029/Microsoft-Services-MS06-066-nwwks.dll.html title Microsoft Services MS06-066 nwwks.dll data source https://packetstormsecurity.com/files/download/82941/ms06_066_nwapi.rb.txt id PACKETSTORM:82941 last seen 2016-12-05 published 2009-11-26 reporter Pusscat source https://packetstormsecurity.com/files/82941/Microsoft-Services-MS06-066-nwapi32.dll.html title Microsoft Services MS06-066 nwapi32.dll
Saint
bid | 20984 |
description | Microsoft Client Service for NetWare tree name buffer overflow |
id | win_patch_netwaredrv |
osvdb | 30260 |
title | microsoft_netware_treename |
type | remote |
References
- http://secunia.com/advisories/22866
- http://secunia.com/advisories/22866
- http://securitytracker.com/id?1017224
- http://securitytracker.com/id?1017224
- http://www.securityfocus.com/archive/1/451844/100/0/threaded
- http://www.securityfocus.com/archive/1/451844/100/0/threaded
- http://www.securityfocus.com/bid/21023
- http://www.securityfocus.com/bid/21023
- http://www.us-cert.gov/cas/techalerts/TA06-318A.html
- http://www.us-cert.gov/cas/techalerts/TA06-318A.html
- http://www.vupen.com/english/advisories/2006/4504
- http://www.vupen.com/english/advisories/2006/4504
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29952
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29952
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A404
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A404