CVE-2006-2371

Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," that lead to registry corruption and stack corruption, aka the "RASMAN Registry Corruption Vulnerability."
References
Link Resource
http://secunia.com/advisories/20630 Patch Vendor Advisory
http://securityreason.com/securityalert/1096
http://securitytracker.com/id?1016285
http://www.kb.cert.org/vuls/id/814644 US Government Resource
http://www.osvdb.org/26436
http://www.securityfocus.com/archive/1/436977/100/0/threaded
http://www.securityfocus.com/bid/18358 Patch
http://www.us-cert.gov/cas/techalerts/TA06-164A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2323
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025
https://exchange.xforce.ibmcloud.com/vulnerabilities/26814
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1674
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1846
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1851
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1907
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1983
http://secunia.com/advisories/20630 Patch Vendor Advisory
http://securityreason.com/securityalert/1096
http://securitytracker.com/id?1016285
http://www.kb.cert.org/vuls/id/814644 US Government Resource
http://www.osvdb.org/26436
http://www.securityfocus.com/archive/1/436977/100/0/threaded
http://www.securityfocus.com/bid/18358 Patch
http://www.us-cert.gov/cas/techalerts/TA06-164A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2323
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025
https://exchange.xforce.ibmcloud.com/vulnerabilities/26814
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1674
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1846
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1851
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1907
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1983
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://secunia.com/advisories/20630 - Patch, Vendor Advisory () http://secunia.com/advisories/20630 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/1096 - () http://securityreason.com/securityalert/1096 -
References () http://securitytracker.com/id?1016285 - () http://securitytracker.com/id?1016285 -
References () http://www.kb.cert.org/vuls/id/814644 - US Government Resource () http://www.kb.cert.org/vuls/id/814644 - US Government Resource
References () http://www.osvdb.org/26436 - () http://www.osvdb.org/26436 -
References () http://www.securityfocus.com/archive/1/436977/100/0/threaded - () http://www.securityfocus.com/archive/1/436977/100/0/threaded -
References () http://www.securityfocus.com/bid/18358 - Patch () http://www.securityfocus.com/bid/18358 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-164A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-164A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/2323 - () http://www.vupen.com/english/advisories/2006/2323 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26814 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26814 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1674 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1674 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1846 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1846 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1851 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1851 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1857 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1857 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1907 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1907 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1983 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1983 -

Information

Published : 2006-06-13 19:06

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2371

Mitre link : CVE-2006-2371

CVE.ORG link : CVE-2006-2371


JSON object : View

Products Affected

microsoft

  • windows_2003_server
  • windows_xp
  • windows_2000