2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-3942" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-07-31T23:04:00.000" ,
"lastModified" : "2018-10-17T21:32:29.033" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an \"SMB PIPE,\" aka the \"Mailslot DOS\" vulnerability. NOTE: the name \"Mailslot DOS\" was derived from incomplete initial research; the vulnerability is not associated with a mailslot."
} ,
{
"lang" : "es" ,
"value" : "El controlador de servidor (srv.sys) en Microsoft Windows NT 4.0, 2000, XP, y Server 2003 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) mediante un mensaje SMB_COM_TRANSACTION que contiene una cadena sin terminaci\u00f3n de car\u00e1cter nulo, lo cual lleva a una referencia a NULL en la funci\u00f3n ExecuteTransaction, posiblemente relacionado con una \"tuber\u00eda SMB\" (SMB PIPE), tambi\u00e9n conocida como vulnerabilidad \"Mailslot DOS\". NOTA: el nombre \"Mailslot DOS\" es derivado de una investigaci\u00f3n inicial imcompleta; la vulnerabilidad no est\u00e1 asociada con un mailslot (ranura de correo)."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.8
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*" ,
"matchCriteriaId" : "330B6798-5380-44AD-9B52-DF5955FA832C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2CA1674-A8A0-479A-9D80-344D3C563A24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0808041A-CE1A-433A-9C2B-019097CCFB0C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E7FD818-322D-4089-A644-360C33943D29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "644E2E89-F3E3-4383-B460-424D724EE62F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*" ,
"matchCriteriaId" : "7D11FC8D-59DD-4CAC-B4D3-DABB7A9903F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*" ,
"matchCriteriaId" : "91D6D065-A28D-49DA-B7F4-38421FF86498"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*" ,
"matchCriteriaId" : "B9687E6C-EDE9-42E4-93D0-C4144FEC917A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ,
"matchCriteriaId" : "FB2BE2DE-7B06-47ED-A674-15D45448F357"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://blogs.technet.com/msrc/archive/2006/07/28/443837.aspx" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/21276" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1016606" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1017035" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.coresecurity.com/common/showdoc.php?idx=562&idxseccion=10" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/27644" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/443287/100/200/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/19215" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3037" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://xforce.iss.net/xforce/alerts/id/231" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27999" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A428" ,
"source" : "cve@mitre.org"
}
]
}