9.3
CVSSv2

CVE-2006-2379

CVSSv4: NA | CVSSv3: NA | CVSSv2: 9.3 | VMScore: 1000 | EPSS: 0.94731 | KEV: Not Included
Published: 13/06/2006 Updated: 21/11/2024

Vulnerability Summary

Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows remote malicious users to execute arbitrary code via unknown vectors related to IP source routing.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2003 server datacenter 64-bit

microsoft windows 2003 server enterprise

microsoft windows 2003 server enterprise 64-bit

microsoft windows 2003 server r2

microsoft windows 2003 server standard

microsoft windows 2003 server standard 64-bit

microsoft windows 2003 server web

microsoft windows nt 4.0

microsoft windows xp

Exploits

/* #################################### # # Windows TCP/IP source routing poc # C version # # by Preddy # # RootShell Security Group # # Shoutz 2: # # Jimmy and ByteCoder + # Rs Crew + # Rest of the world :D # # #################################### Compile: gcc win-tcpip-dosc -o wintcpipdos Info: Published: 14062006 Source: ...

References

CWE-119https://nvd.nist.govhttps://www.exploit-db.com/exploits/1967/https://www.kb.cert.org/vuls/id/722753https://www.first.org/epsshttp://secunia.com/advisories/20639http://securitytracker.com/id?1016290http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702http://www.kb.cert.org/vuls/id/722753http://www.osvdb.org/26433http://www.securityfocus.com/archive/1/438482/100/0/threadedhttp://www.securityfocus.com/archive/1/438609/100/0/threadedhttp://www.securityfocus.com/bid/18374http://www.us-cert.gov/cas/techalerts/TA06-164A.htmlhttp://www.vupen.com/english/advisories/2006/2329https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032https://exchange.xforce.ibmcloud.com/vulnerabilities/26834https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018http://secunia.com/advisories/20639http://securitytracker.com/id?1016290http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702http://www.kb.cert.org/vuls/id/722753http://www.osvdb.org/26433http://www.securityfocus.com/archive/1/438482/100/0/threadedhttp://www.securityfocus.com/archive/1/438609/100/0/threadedhttp://www.securityfocus.com/bid/18374http://www.us-cert.gov/cas/techalerts/TA06-164A.htmlhttp://www.vupen.com/english/advisories/2006/2329https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032https://exchange.xforce.ibmcloud.com/vulnerabilities/26834https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018