CVE-2006-3840

The SMB Mailslot parsing functionality in PAM in multiple ISS products with XPU (24.39/1.78/epj/x.x.x.1780), including Proventia A, G, M, Server, and Desktop, BlackICE PC and Server Protection 3.6, and RealSecure 7.0, allows remote attackers to cause a denial of service (infinite loop) via a crafted SMB packet that is not properly handled by the SMB_Mailslot_Heap_Overflow decode.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:iss:blackice_pc_protection:3.6cpk:*:*:*:*:*:*:*
cpe:2.3:a:iss:blackice_server_protection:3.6cpk:*:*:*:*:*:*:*
cpe:2.3:a:iss:proventia_desktop:8.0.675.1790:*:*:*:*:*:*:*
cpe:2.3:a:iss:proventia_desktop:8.0.812.1790:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_network:7.0:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_server_sensor:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:iss:proventia_a_series_xpu:*:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_g_series_xpu:*:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_m_series_xpu:*:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_server:1.0.914.1880:*:*:*:*:*:*:*

History

21 Nov 2024, 00:14

Type Values Removed Values Added
References () http://secunia.com/advisories/21219 - Vendor Advisory () http://secunia.com/advisories/21219 - Vendor Advisory
References () http://securitytracker.com/id?1016590 - () http://securitytracker.com/id?1016590 -
References () http://securitytracker.com/id?1016591 - () http://securitytracker.com/id?1016591 -
References () http://securitytracker.com/id?1016592 - () http://securitytracker.com/id?1016592 -
References () http://www.nsfocus.com/english/homepage/research/0607.htm - () http://www.nsfocus.com/english/homepage/research/0607.htm -
References () http://www.securityfocus.com/archive/1/441278/100/0/threaded - () http://www.securityfocus.com/archive/1/441278/100/0/threaded -
References () http://www.securityfocus.com/bid/19178 - () http://www.securityfocus.com/bid/19178 -
References () http://www.vupen.com/english/advisories/2006/2996 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2996 - Vendor Advisory
References () http://xforce.iss.net/xforce/alerts/id/230 - Vendor Advisory () http://xforce.iss.net/xforce/alerts/id/230 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27965 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27965 -
References () https://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630 - () https://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630 -

Information

Published : 2006-07-27 11:04

Updated : 2024-11-21 00:14


NVD link : CVE-2006-3840

Mitre link : CVE-2006-3840

CVE.ORG link : CVE-2006-3840


JSON object : View

Products Affected

iss

  • realsecure_server_sensor
  • proventia_m_series_xpu
  • proventia_desktop
  • proventia_server
  • realsecure_network
  • proventia_g_series_xpu
  • blackice_server_protection
  • proventia_a_series_xpu
  • blackice_pc_protection
  • realsecure_desktop
CWE
CWE-399

Resource Management Errors