Описание
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-3440
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A747
- http://secunia.com/advisories/21394
- http://securitytracker.com/id?1016653
- http://www.kb.cert.org/vuls/id/908276
- http://www.securityfocus.com/bid/19319
- http://www.us-cert.gov/cas/techalerts/TA06-220A.html
- http://www.vupen.com/english/advisories/2006/3211
EPSS
Процентиль: 99%
0.725
Высокий
CVE ID
Связанные уязвимости
nvd
больше 19 лет назад
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
EPSS
Процентиль: 99%
0.725
Высокий