Lucene search

K
saintSAINT CorporationSAINT:196A97F73EEF3B5D1EFCFB0026B813A8
HistoryAug 11, 2006 - 12:00 a.m.

Windows Server Service buffer overflow

2006-08-1100:00:00
SAINT Corporation
my.saintcorporation.com
17

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%

Added: 08/11/2006
CVE: CVE-2006-3439
BID: 19409
OSVDB: 27845

Background

The Windows Server Service supports file, print, and named-pipe sharing over the network.

Problem

A buffer overflow vulnerability in the Windows Server Service allows remote attackers to execute arbitrary commands.

Resolution

Apply the patch referenced in Microsoft Security Bulletin 06-040.

References

<http://www.microsoft.com/technet/security/bulletin/ms06-040.mspx&gt;

Limitations

Exploit works on Windows 2000 and Windows XP SP1. Target computer may reboot after connection is closed.

Platforms

Windows 2000
Windows XP

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%