8.1 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.827 High
EPSS
Percentile
98.3%
Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing.
secunia.com/advisories/20639
securitytracker.com/id?1016290
www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702
www.kb.cert.org/vuls/id/722753
www.osvdb.org/26433
www.securityfocus.com/archive/1/438482/100/0/threaded
www.securityfocus.com/archive/1/438609/100/0/threaded
www.securityfocus.com/bid/18374
www.us-cert.gov/cas/techalerts/TA06-164A.html
www.vupen.com/english/advisories/2006/2329
docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032
exchange.xforce.ibmcloud.com/vulnerabilities/26834
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018