Vulnerability Name: CVE-2006-3439 (CCN-28002) Assigned: 2006-08-08 Published: 2006-08-08 Updated: 2018-10-12 Summary: Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314 . CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2006-3439 Source: CCN Type: SA21388Windows Server Service Buffer Overflow Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory21388 Source: CCN Type: SECTRACK ID: 1016667Windows Server Service Buffer Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1016667 Source: CCN Type: ASA-2006-154Windows Security Updates for August 2006 - (MS06-040 - MS06-051) Source: CCN Type: Microsoft Knowledge Base Article 921883MS06-040: Vulnerability in Server service could allow remote code execution Source: CISCO Type: UNKNOWN20060814 Mitigating Exploitation of the MS06-040 Service Buffer Vulnerability Source: CCN Type: cisco-sr-20060814-ms06-040-vulnerabilityCisco Security Response: Mitigating Exploitation of the MS06-040 Service Buffer Vulnerability Source: MISC Type: UNKNOWNhttp://www.dhs.gov/dhspublic/display?content=5789 Source: CCN Type: US-CERT VU#650769Microsoft Windows Server service buffer overflow Source: CERT-VN Type: Patch, US Government ResourceVU#650769 Source: CCN Type: Microsoft Security Bulletin MS06-040Vulnerability In Server Service Could All Remote Code Execution (921883) Source: CCN Type: Microsoft Security Bulletin MS06-070Vulnerability in Workstation Service Could Allow Remote Code Execution (924270) Source: BID Type: UNKNOWN19409 Source: CCN Type: BID-19409Microsoft Windows Server Service Remote Buffer Overflow Vulnerability Source: CCN Type: US-CERT Technical Cyber Security Alert TA06-220AMicrosoft Windows, Office, and Internet Explorer Vulnerabilities Source: CERT Type: Patch, US Government ResourceTA06-220A Source: VUPEN Type: UNKNOWNADV-2006-3210 Source: CCN Type: Internet Security Systems Protection Advisory August 8, 2006Microsoft Server Service Buffer Overflow Vulnerability Source: MS Type: UNKNOWNMS06-040 Source: XF Type: UNKNOWNms-server-service-bo(28002) Source: XF Type: UNKNOWNms-server-service-bo(28002) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:492 Source: EXPLOIT-DB Type: EXPLOITOffensive Security Exploit Database [02-11-2011] Source: CCN Type: Rapid7 Vulnerability and Exploit Database [08-08-2006]MS06-040 Microsoft Server Service NetpwPathCanonicalize Overflow Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_2000:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000::sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000::sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000::sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp::sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2003_server:::itanium:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:::x64:*:professional:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:-:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 * sp4
microsoft windows 2003 server 64-bit
microsoft windows 2003 server itanium
microsoft windows 2003 server r2
microsoft windows 2003 server sp1
microsoft windows 2003 server sp1
microsoft windows xp *
microsoft windows xp * sp1
microsoft windows xp * sp2
microsoft windows 2000
microsoft windows 2000 sp1
microsoft windows 2000 sp2
microsoft windows 2000 sp3
microsoft windows xp sp1
microsoft windows 2000 sp4
microsoft windows 2003_server
microsoft windows xp sp2
microsoft windows 2003 server
microsoft windows 2003_server sp1
microsoft windows xp
microsoft windows 2003_server sp1_itanium
microsoft windows 2003 -