5
CVSSv2

CVE-2006-3880

Published: 27/07/2006 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote malicious users to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in certain TCP header fields, as demonstrated by the Achilles Windows Attack Tool. NOTE: the researcher reports that the Microsoft Security Response Center has stated "Our investigation which has included code review, review of the TCPDump, and attempts on reproing the issue on multiple fresh installs of various Windows Operating Systems have all resulted in non confirmation.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2003 server datacenter_edition_64-bit

microsoft windows 2003 server standard

microsoft windows xp

microsoft windows 2003 server web

microsoft windows 2003 server enterprise_64-bit

microsoft windows 2000

microsoft windows 2003 server standard_64-bit

microsoft windows 2003 server enterprise_edition_64-bit

microsoft windows 2003 server r2

microsoft windows 2003 server sp1

microsoft windows 2003 server enterprise_edition

microsoft windows 2003 server datacenter_edition

Exploits

source: wwwsecurityfocuscom/bid/19135/info Microsoft Windows is reportedly prone to a remote denial-of-service vulnerability This issue may be due to the operating system's failure to properly handle unexpected network traffic This issue may cause affected computers to crash, denying service to legitimate users Note that Microsoft ha ...