10
CVSSv2

CVE-2006-3439

Published: 09/08/2006 Updated: 12/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2003 server r2

microsoft windows 2003 server sp1

microsoft windows 2000

microsoft windows xp

microsoft windows 2003 server 64-bit

microsoft windows 2003 server itanium

Exploits

## # $Id: ms06_040_netapirb 11762 2011-02-17 03:56:15Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
/* * MS06-040 Remote Code Execution Proof of Concept * * Ported by ub3r st4r aka iRP * --------------------------------------------------------------------- * Tested Against: * Windows XP SP1 * Windows 2000 SP4 * * Systems Affected: * Microsoft Windows 2000 SP0-SP4 * Microsoft Windows XP SP0-SP1 * Microsoft Windows NT 40 * ------ ...
/* Microsoft Windows CanonicalizePathName() Remote Overflow MSO6-040 More info: wwwmicrosoftcom/technet/security/bulletin/MS06-040mspx Written by Preddy This is another version of hdm's metasploit version but ported to C, Works against Windows XP SP1 And it should give a crash on Win2k in servicesexe On successfull exploitation it pro ...
######################################################################### # netapi_win2003pm (MS06-040 Exploit for Windows Server 2003 SP0) # # Author: Trirat Puttaraksa (Kira) <trir00t [at] gmailcom> # # sf-freedomblogspotcom # # For educational purpose only # # Note: This exploit is developed because of my question "Is it exploi ...
## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic) The latest # version of the Framework can always be obtained from metasp ...