Vulnerability Name:

CVE-2006-3441 (CCN-24586)

Assigned:2006-08-08
Published:2006-08-08
Updated:2018-10-12
Summary:Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response.
Note: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-3441

Source: CCN
Type: SA21394
Windows DNS Resolution Code Execution Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
21394

Source: CCN
Type: SECTRACK ID: 1016653
Windows Winsock and DNS Client Buffer Overflows Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016653

Source: CCN
Type: Internet Security Systems Protection Advisory August 8, 2006
Microsoft DNS Client ATMA Buffer Overflow Vulnerability

Source: CCN
Type: US-CERT VU#794580
Microsoft DNS Client buffer overflow

Source: CERT-VN
Type: Patch, US Government Resource
VU#794580

Source: CCN
Type: Microsoft Security Bulletin MS06-041
Vulnerabilities in DNS Resolution Could Allow Remote Code Execution (920683)

Source: OSVDB
Type: UNKNOWN
27844

Source: CCN
Type: OSVDB ID: 27844
Microsoft Windows DNS Client Service Record Response Overflow

Source: BID
Type: UNKNOWN
19404

Source: CCN
Type: BID-19404
Microsoft Windows DNS Client Buffer Overrun Vulnerability

Source: CERT
Type: Patch, US Government Resource
TA06-220A

Source: VUPEN
Type: UNKNOWN
ADV-2006-3211

Source: ISS
Type: UNKNOWN
20060808 Microsoft DNS Client Character String Buffer Overflow Vulnerability

Source: ISS
Type: UNKNOWN
20060808 Microsoft DNS Client ATMA Buffer Overflow Vulnerability

Source: ISS
Type: UNKNOWN
20060808 Microsoft DNS Client Integer Overflow Vulnerability

Source: MS
Type: UNKNOWN
MS06-041

Source: XF
Type: UNKNOWN
dns-rrdatalen-underflow(24586)

Source: XF
Type: UNKNOWN
dns-rrdatalen-underflow(24586)

Source: XF
Type: UNKNOWN
win-dns-client-bo(28013)

Source: XF
Type: UNKNOWN
dns-data-string-bo(28240)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:723

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_2003:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3441 (CCN-28013)

    Assigned:2006-08-08
    Published:2006-08-08
    Updated:2018-10-12
    Summary:Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response.
    Note: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.
    CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): High
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
    5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3441

    Source: CCN
    Type: SA21394
    Windows DNS Resolution Code Execution Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016653
    Windows Winsock and DNS Client Buffer Overflows Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: ASA-2006-154
    Windows Security Updates for August 2006 - (MS06-040 - MS06-051)

    Source: CCN
    Type: Internet Security Systems Protection Advisory August 8, 2006
    Microsoft DNS Client Integer Overflow Vulnerability

    Source: CCN
    Type: US-CERT VU#794580
    Microsoft DNS Client buffer overflow

    Source: CCN
    Type: Microsoft Security Bulletin MS06-041
    Vulnerabilities in DNS Resolution Could Allow Remote Code Execution (920683)

    Source: CCN
    Type: OSVDB ID: 27844
    Microsoft Windows DNS Client Service Record Response Overflow

    Source: CCN
    Type: BID-19404
    Microsoft Windows DNS Client Buffer Overrun Vulnerability

    Source: CCN
    Type: US-CERT Technical Cyber Security Alert TA06-220A
    Microsoft Windows, Office, and Internet Explorer Vulnerabilities

    Source: XF
    Type: UNKNOWN
    win-dns-client-bo(28013)

    Vulnerability Name:

    CVE-2006-3441 (CCN-28240)

    Assigned:2006-08-08
    Published:2006-08-08
    Updated:2006-08-08
    Summary:Microsoft DNS client software is vulnerable to a heap-based buffer overflow, caused by improper bounds checking of DNS packets. By sending a malicious DNS response to any valid DNS query by the client, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges used when the DNS client was invoked.

    To exploit this vulnerability, the attacker needs to either entice a victim to query a specific DNS server, or to sniff network traffic and send DNS responses to questions a client has asked of another DNS server.
    CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): High
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
    5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3441

    Source: CCN
    Type: SA21394
    Windows DNS Resolution Code Execution Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016653
    Windows Winsock and DNS Client Buffer Overflows Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Internet Security Systems Protection Advisory August 8, 2006
    Microsoft DNS Client Character String Buffer Overflow Vulnerability

    Source: CCN
    Type: US-CERT VU#794580
    Microsoft DNS Client buffer overflow

    Source: CCN
    Type: Microsoft Security Bulletin MS06-041
    Vulnerabilities in DNS Resolution Could Allow Remote Code Execution (920683)

    Source: CCN
    Type: OSVDB ID: 27844
    Microsoft Windows DNS Client Service Record Response Overflow

    Source: CCN
    Type: BID-19404
    Microsoft Windows DNS Client Buffer Overrun Vulnerability

    Source: XF
    Type: UNKNOWN
    dns-data-string-bo(28240)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:723
    V
    DNS Client Buffer Overrun Vulnerability
    2011-05-09
    BACK
    microsoft windows 2000 * sp4
    microsoft windows 2003 server 64-bit
    microsoft windows 2003 server sp1
    microsoft windows 2003 server sp1
    microsoft windows xp *
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows xp * sp1
    microsoft windows 2000 * sp4
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003 server *
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows 2003 *
    microsoft windows xp * sp1
    microsoft windows 2000 * sp4
    microsoft windows 2003_server
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003 server *
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium