CVE-2006-3441

critical

Description

Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A723

https://exchange.xforce.ibmcloud.com/vulnerabilities/28240

https://exchange.xforce.ibmcloud.com/vulnerabilities/28013

https://exchange.xforce.ibmcloud.com/vulnerabilities/24586

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041

http://xforce.iss.net/xforce/alerts/id/235

http://xforce.iss.net/xforce/alerts/id/234

http://xforce.iss.net/xforce/alerts/id/233

http://www.vupen.com/english/advisories/2006/3211

http://www.us-cert.gov/cas/techalerts/TA06-220A.html

http://www.securityfocus.com/bid/19404

http://www.osvdb.org/27844

http://www.kb.cert.org/vuls/id/794580

http://securitytracker.com/id?1016653

http://secunia.com/advisories/21394

Details

Source: Mitre, NVD

Published: 2006-08-09

Updated: 2018-10-12

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical