Summary
This host is missing important security update according to Microsoft Bulletin MS06-040.
Impact
Successful exploitation could allow remote code execution by sending a specially crafted RPC request and can take complete control of an affected system.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link.
http://technet.microsoft.com/en-us/security/bulletin/ms06-040
Insight
The flaw is due to a boundary error in the 'CanonicalizePathName()' function in netapi32.dll and can be exploited to cause a stack-based buffer overflow via a malicious NetrpPathCanonicalize RPC request with an overly long path name to the Server Service.
Affected
Microsoft Windows XP Service Pack 2 and prior
Microsoft Windows 2K3 Service Pack 1 and prior
Microsoft Windows 2000 Service Pack 4 and prior.
References
Severity
Classification
-
CVE CVE-2006-3439 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft DirectShow Remote Code Execution Vulnerability (961373)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- Microsoft DirectAccess Security Advisory (2862152)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
- Microsoft DirectShow Remote Code Execution Vulnerability (2845187)