[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-2372

Date: (C)2006-07-11   (M)2017-10-19
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a crafted DHCP response.

Reference:
SECTRACK-1016468
SREASON-1201
BID-18923
http://www.securityfocus.com/archive/1/archive/1/439675/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/444631/100/0/threaded
EXPLOIT-DB-2054
SECUNIA-21010
OSVDB-27151
ADV-2006-2754
IAVM:2006-B-0010
MS06-036
TA06-192A
VU#257164
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf

CPE    1
cpe:/a:microsoft:dhcp_client_service
CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:232

© 2013 SecPod Technologies