Vulnerability Details : CVE-2006-3439
Public exploit exists!
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2006-3439
Probability of exploitation activity in the next 30 days: 96.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2006-3439
-
MS06-040 Microsoft Server Service NetpwPathCanonicalize Overflow
Disclosure Date: 2006-08-08First seen: 2020-04-26exploit/windows/smb/ms06_040_netapiThis module exploits a stack buffer overflow in the NetApi32 CanonicalizePathName() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denia
CVSS scores for CVE-2006-3439
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2006-3439
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28002
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A492
-
http://www.kb.cert.org/vuls/id/650769
Patch;US Government Resource
-
http://www.vupen.com/english/advisories/2006/3210
-
http://securitytracker.com/id?1016667
-
http://www.cisco.com/en/US/products/ps6120/tsd_products_security_response09186a008070c75a.html
-
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
Patch;US Government Resource
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-040
-
http://www.securityfocus.com/bid/19409
Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
-
http://www.dhs.gov/dhspublic/display?content=5789
Products affected by CVE-2006-3439
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*