[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-3441Date: (C)2006-08-08   (M)2023-12-22


Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016653
BID-19404
http://xforce.iss.net/xforce/alerts/id/234
http://xforce.iss.net/xforce/alerts/id/233
http://xforce.iss.net/xforce/alerts/id/235
SECUNIA-21394
OSVDB-27844
ADV-2006-3211
IAVM:2006-B-0011
MS06-041
TA06-220A
VU#794580
dns-data-string-bo(28240)
dns-rrdatalen-underflow(24586)
win-dns-client-bo(28013)

CPE    2
cpe:/o:microsoft:windows_xp::sp1:tablet_pc
cpe:/o:microsoft:windows_xp::sp2:tablet_pc
OVAL    1
oval:org.mitre.oval:def:723

© SecPod Technologies