{"vuid":"VU#650769","idnumber":"650769","name":"Microsoft Windows Server service buffer overflow","keywords":["SMB","RPC","DCE/RPC","MS RPC","139/tcp","445/tcp","CIFS","stack","buffer overflow","code execution","ms06-aug"],"overview":"A stack-based buffer overflow exists in the Microsoft Server service. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges.","clean_desc":"Microsoft Server Service MS06-040 includes the following information: The Server service provides RPC support, file print support and named pipe sharing over the network. The Server service allows the sharing of your local resources (such as disks and printers) so that other users on the network can access them. It also allows named pipe communication between applications running on other computers and your computer, which is used for RPC. Microsoft Remote Procedure Call (MS RPC) and Server Message Block (SMB) RPC provides a mechanism that allows a program to execute a procedure on a remote system in a way that is transparent to the calling program. MS RPC is the Microsoft implementation of RPC. Windows services that use MS RPC may use SMB named pipes as the transport service for MS RPC calls. The Problem A stack-based buffer overflow exists in the Microsoft Server service. If a remote attacker sends a specially crafted packet to a vulnerable Windows system, that attacker may be able to trigger the buffer overflow. Note that we have received reports that this vulnerability is actively being exploited. More information, including a list of affected versions of Windows, is available in Microsoft Security Bulletin MS06-040. We have confirmed that this vulnerability affects Windows NT4. However, according to Microsoft Security Bulletin MS06-040: Windows NT Workstation 4.0 Service Pack 6a, Windows NT Server 4.0 Service Pack 6a, Windows 2000 Service Pack 2, and Windows 2000 Service Pack 3 have reached the end of their support life cycles. It should be a priority for customers who have these operating system versions to migrate to supported versions to prevent potential exposure to vulnerabilities. For more information about the Windows Product Lifecycle, visit the following Microsoft Support Lifecycle Web site. For more information about the extended security update support period for these operating system versions, visit the Microsoft Product Support Services Web site. Windows NT4 users should observe the workarounds below as well as the recommendations in the Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges.","resolution":"Apply a patch from Microsoft\nMicrosoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-040. Microsoft has released a new version of Security Bulletin MS06-040 and the associated security updates. The new version corrects the problem described in Microsoft Knowledge Base Article 921883. Programs that request large amounts of contiguous memory running on Windows Server 2003 SP1 and Windows XP Professional x64 Edition systems with the previous version of the MS06-040 update installed could crash.","workarounds":"Until a patch can be applied, the following actions may red","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS06-040","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-040.mspx","http://support.microsoft.com/kb/246261/","http://support.microsoft.com/kb/328459/","http://blogs.technet.com/msrc/archive/2006/08/15/446848.aspx","http://www.microsoft.com/technet/security/topics/networksecurity/threatmi.mspx"],"cveids":["CVE-2006-3439"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2020-05-21T16:13:06.708221Z","publicdate":"2006-08-08T00:00:00Z","datefirstpublished":"2006-08-08T17:28:00Z","dateupdated":"2006-09-18T17:19:02Z","revision":81,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":"N/A","cvss_basevector":"N/A","cvss_temporalscore":"N/A","cvss_environmentalscore":"N/A","cvss_environmentalvector":"N/A","metric":58.275,"vulnote":null}