CVE-2006-2372

Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a crafted DHCP response.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0222.html
http://secunia.com/advisories/21010 Patch Vendor Advisory
http://securityreason.com/securityalert/1201
http://securitytracker.com/id?1016468
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf Patch
http://www.kb.cert.org/vuls/id/257164 US Government Resource
http://www.osvdb.org/27151
http://www.securityfocus.com/archive/1/439675/100/0/threaded
http://www.securityfocus.com/archive/1/444631/100/0/threaded
http://www.securityfocus.com/bid/18923 Patch
http://www.us-cert.gov/cas/techalerts/TA06-192A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2754
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A232
https://www.exploit-db.com/exploits/2054
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0222.html
http://secunia.com/advisories/21010 Patch Vendor Advisory
http://securityreason.com/securityalert/1201
http://securitytracker.com/id?1016468
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf Patch
http://www.kb.cert.org/vuls/id/257164 US Government Resource
http://www.osvdb.org/27151
http://www.securityfocus.com/archive/1/439675/100/0/threaded
http://www.securityfocus.com/archive/1/444631/100/0/threaded
http://www.securityfocus.com/bid/18923 Patch
http://www.us-cert.gov/cas/techalerts/TA06-192A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2754
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A232
https://www.exploit-db.com/exploits/2054
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:dhcp_client_service:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0222.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0222.html -
References () http://secunia.com/advisories/21010 - Patch, Vendor Advisory () http://secunia.com/advisories/21010 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/1201 - () http://securityreason.com/securityalert/1201 -
References () http://securitytracker.com/id?1016468 - () http://securitytracker.com/id?1016468 -
References () http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf - Patch () http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_Microsoft_Windows_DHCP_Client_Service_Remote_Buffer_Overflow.pdf - Patch
References () http://www.kb.cert.org/vuls/id/257164 - US Government Resource () http://www.kb.cert.org/vuls/id/257164 - US Government Resource
References () http://www.osvdb.org/27151 - () http://www.osvdb.org/27151 -
References () http://www.securityfocus.com/archive/1/439675/100/0/threaded - () http://www.securityfocus.com/archive/1/439675/100/0/threaded -
References () http://www.securityfocus.com/archive/1/444631/100/0/threaded - () http://www.securityfocus.com/archive/1/444631/100/0/threaded -
References () http://www.securityfocus.com/bid/18923 - Patch () http://www.securityfocus.com/bid/18923 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-192A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-192A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/2754 - () http://www.vupen.com/english/advisories/2006/2754 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A232 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A232 -
References () https://www.exploit-db.com/exploits/2054 - () https://www.exploit-db.com/exploits/2054 -

Information

Published : 2006-07-11 21:05

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2372

Mitre link : CVE-2006-2372

CVE.ORG link : CVE-2006-2372


JSON object : View

Products Affected

microsoft

  • dhcp_client_service
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer