The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://xforce.iss.net/xforce/alerts/id/231 | third party advisory |
http://www.vupen.com/english/advisories/2006/3037 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/449179/100/0/threaded | vendor advisory |
http://www.securityfocus.com/archive/1/443287/100/200/threaded | mailing list |
http://www.securityfocus.com/bid/19215 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 | vendor advisory |
http://www.coresecurity.com/common/showdoc.php?idx=562&idxseccion=10 | |
http://securitytracker.com/id?1016606 | vdb entry |
http://secunia.com/advisories/21276 | third party advisory vendor advisory |
http://securitytracker.com/id?1017035 | vdb entry |
http://www.osvdb.org/27644 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27999 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A428 | signature vdb entry |
http://blogs.technet.com/msrc/archive/2006/07/28/443837.aspx |