Описание
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4691
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29948
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A607
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908
- http://research.eeye.com/html/advisories/published/AD20061114.html
- http://secunia.com/advisories/22883
- http://securitytracker.com/id?1017221
- http://www.kb.cert.org/vuls/id/778036
- http://www.securityfocus.com/archive/1/451588/100/0/threaded
- http://www.securityfocus.com/bid/20985
- http://www.us-cert.gov/cas/techalerts/TA06-318A.html
- http://www.vupen.com/english/advisories/2006/4508
EPSS
CVE ID
Связанные уязвимости
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
EPSS