10
CVSSv2

CVE-2006-3441

Published: 09/08/2006 Updated: 12/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote malicious users to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2003 server sp1

microsoft windows xp

microsoft windows 2000

microsoft windows 2003 server 64-bit

Exploits

#!/usr/bin/python #POC for MS06-041 #Run the python script passing the local ip address as parameter The DNS server #will start listening on this ip address for DNS hostname resolution queries #This script is for testing and educational purpose and so to test this one will #have to point the DNS resolver on the target/client to the ip address on ...