Vulnerability Name:

CVE-2006-6296 (CCN-30717)

Assigned:2006-12-01
Published:2006-12-01
Updated:2019-04-30
Summary:The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large 'offered' value (output buffer size), a variant of CVE-2005-3644.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:6.1 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
5.5 Medium (Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-6296

Source: MISC
Type: UNKNOWN
http://research.eeye.com/html/alerts/zeroday/20051116.html

Source: CCN
Type: SA23196
Microsoft Windows Print Spooler Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
23196

Source: CCN
Type: SECTRACK ID: 1017330
Windows Print Spooler Subsystem GetPrinterData() Function Lets Remote Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1017330

Source: MISC
Type: UNKNOWN
http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker/2005/20051116

Source: CCN
Type: US-CERT VU#914617
Microsoft Windows Print Spooler service fails to properly handle RPC requests

Source: CERT-VN
Type: US Government Resource
VU#914617

Source: CCN
Type: OSVDB ID: 20916
Microsoft Windows UPnP GetDeviceList Remote DoS

Source: BID
Type: Exploit, Vendor Advisory
21401

Source: CCN
Type: BID-21401
Microsoft Windows Print Spooler GetPrinterData Denial of Service Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-4827

Source: XF
Type: UNKNOWN
windows-printspooler-dos(30717)

Source: XF
Type: UNKNOWN
windows-printspooler-dos(30717)

Source: EXPLOIT-DB
Type: UNKNOWN
2879

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_2000:-:-:*:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:advanced_server:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:-:*:*:server:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows 2000 * sp4
    microsoft windows 2000 * sp4
    microsoft windows xp * sp1
    microsoft windows 2000 - -
    microsoft windows 2000 - sp4
    microsoft windows 2000 - -