[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2372Date: (C)2006-07-11   (M)2023-12-22


Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a crafted DHCP response.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016468
SREASON-1201
BID-18923
http://www.securityfocus.com/archive/1/439675/100/0/threaded
http://www.securityfocus.com/archive/1/444631/100/0/threaded
EXPLOIT-DB-2054
SECUNIA-21010
OSVDB-27151
ADV-2006-2754
MS06-036
TA06-192A
VU#257164
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf
oval:org.mitre.oval:def:232

CPE    1
cpe:/a:microsoft:dhcp_client_service
CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:232

© SecPod Technologies