Vulnerabilities > CVE-2006-5583 - Remote Code Execution vulnerability in Microsoft Windows 2003 Server 2000/Sp1/Xpsp2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in the SNMP Service in Microsoft Windows 2000 SP4, XP SP2, Server 2003, Server 2003 SP1, and possibly other versions allows remote attackers to execute arbitrary code via a crafted SNMP packet, aka "SNMP Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS06-074.NASL |
description | The remote host contains a flaw in its SNMP service that could allow remote code execution. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23837 |
published | 2006-12-12 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23837 |
title | MS06-074: Vulnerability in SNMP Could Allow Remote Code Execution (926247) |
Oval
accepted | 2011-05-09T04:00:03.324-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Buffer overflow in the SNMP Service in Microsoft Windows 2000 SP4, XP SP2, Server 2003, Server 2003 SP1, and possibly other versions allows remote attackers to execute arbitrary code via a crafted SNMP packet, aka "SNMP Memory Corruption Vulnerability." | ||||||||||||||||||||
family | windows | ||||||||||||||||||||
id | oval:org.mitre.oval:def:1047 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2006-12-13T08:17:04 | ||||||||||||||||||||
title | SNMP Memory Corruption Vulnerability | ||||||||||||||||||||
version | 71 |
References
- http://secunia.com/advisories/23307
- http://securitytracker.com/id?1017371
- http://www.kb.cert.org/vuls/id/901584
- http://www.securityfocus.com/archive/1/454969/100/200/threaded
- http://www.securityfocus.com/bid/21537
- http://www.us-cert.gov/cas/techalerts/TA06-346A.html
- http://www.vupen.com/english/advisories/2006/4967
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-074
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1047