CVE-2006-0021

Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote attackers to cause a denial of service (hang) via an IGMP packet with an invalid IP option, aka the "IGMP v3 DoS Vulnerability."
References
Link Resource
http://secunia.com/advisories/18853 Patch Vendor Advisory
http://securitytracker.com/id?1015629
http://www.kb.cert.org/vuls/id/839284 Third Party Advisory US Government Resource
http://www.securiteam.com/exploits/5PP0T0KI0O.html
http://www.securityfocus.com/archive/1/482658/30/4350/threaded
http://www.securityfocus.com/bid/16645 Patch
http://www.us-cert.gov/cas/techalerts/TA06-045A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0576 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007
https://exchange.xforce.ibmcloud.com/vulnerabilities/24489
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1310
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1425
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1647
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1662
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A678
https://www.exploit-db.com/exploits/1599
http://secunia.com/advisories/18853 Patch Vendor Advisory
http://securitytracker.com/id?1015629
http://www.kb.cert.org/vuls/id/839284 Third Party Advisory US Government Resource
http://www.securiteam.com/exploits/5PP0T0KI0O.html
http://www.securityfocus.com/archive/1/482658/30/4350/threaded
http://www.securityfocus.com/bid/16645 Patch
http://www.us-cert.gov/cas/techalerts/TA06-045A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0576 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007
https://exchange.xforce.ibmcloud.com/vulnerabilities/24489
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1310
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1425
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1647
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1662
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A678
https://www.exploit-db.com/exploits/1599
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://secunia.com/advisories/18853 - Patch, Vendor Advisory () http://secunia.com/advisories/18853 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015629 - () http://securitytracker.com/id?1015629 -
References () http://www.kb.cert.org/vuls/id/839284 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/839284 - Third Party Advisory, US Government Resource
References () http://www.securiteam.com/exploits/5PP0T0KI0O.html - () http://www.securiteam.com/exploits/5PP0T0KI0O.html -
References () http://www.securityfocus.com/archive/1/482658/30/4350/threaded - () http://www.securityfocus.com/archive/1/482658/30/4350/threaded -
References () http://www.securityfocus.com/bid/16645 - Patch () http://www.securityfocus.com/bid/16645 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-045A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-045A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2006/0576 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0576 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24489 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24489 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1310 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1310 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1425 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1425 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1647 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1647 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1662 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1662 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A678 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A678 -
References () https://www.exploit-db.com/exploits/1599 - () https://www.exploit-db.com/exploits/1599 -

Information

Published : 2006-02-14 19:06

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0021

Mitre link : CVE-2006-0021

CVE.ORG link : CVE-2006-0021


JSON object : View

Products Affected

microsoft

  • windows_2003_server
  • windows_xp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer