Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA06-318A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A607 | vdb entry signature |
http://www.securityfocus.com/bid/20985 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29948 | vdb entry |
http://secunia.com/advisories/22883 | third party advisory patch vendor advisory |
http://www.kb.cert.org/vuls/id/778036 | third party advisory us government resource |
http://securitytracker.com/id?1017221 | vdb entry |
http://www.securityfocus.com/archive/1/451588/100/0/threaded | mailing list |
http://research.eeye.com/html/advisories/published/AD20061114.html | third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908 | vdb entry signature |
http://www.vupen.com/english/advisories/2006/4508 | vdb entry |