Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2006-2379
Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.676
EPSS Ranking
98.5%
CVSS Severity
CVSS v2 Score
9.3
References
http://secunia.com/advisories/20639
http://securitytracker.com/id?1016290
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702
http://www.kb.cert.org/vuls/id/722753
http://www.osvdb.org/26433
http://www.securityfocus.com/archive/1/438482/100/0/threaded
http://www.securityfocus.com/archive/1/438609/100/0/threaded
http://www.securityfocus.com/bid/18374
http://www.us-cert.gov/cas/techalerts/TA06-164A.html
http://www.vupen.com/english/advisories/2006/2329
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032
https://exchange.xforce.ibmcloud.com/vulnerabilities/26834
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018
http://secunia.com/advisories/20639
http://securitytracker.com/id?1016290
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702
http://www.kb.cert.org/vuls/id/722753
http://www.osvdb.org/26433
http://www.securityfocus.com/archive/1/438482/100/0/threaded
http://www.securityfocus.com/archive/1/438609/100/0/threaded
http://www.securityfocus.com/bid/18374
http://www.us-cert.gov/cas/techalerts/TA06-164A.html
http://www.vupen.com/english/advisories/2006/2329
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032
https://exchange.xforce.ibmcloud.com/vulnerabilities/26834
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018
Products affected by CVE-2006-2379
Microsoft
»
Windows 2000
»
Version:
N/A
cpe:2.3:o:microsoft:windows_2000:-
Microsoft
»
Windows 2000
»
Version:
beta3
cpe:2.3:o:microsoft:windows_2000:beta3
Microsoft
»
Windows 2003 Server
»
Version:
datacenter_64-bit
cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit
Microsoft
»
Windows 2003 Server
»
Version:
enterprise
cpe:2.3:o:microsoft:windows_2003_server:enterprise
Microsoft
»
Windows 2003 Server
»
Version:
enterprise_64-bit
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit
Microsoft
»
Windows 2003 Server
»
Version:
r2
cpe:2.3:o:microsoft:windows_2003_server:r2
Microsoft
»
Windows 2003 Server
»
Version:
standard
cpe:2.3:o:microsoft:windows_2003_server:standard
Microsoft
»
Windows 2003 Server
»
Version:
standard_64-bit
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit
Microsoft
»
Windows 2003 Server
»
Version:
web
cpe:2.3:o:microsoft:windows_2003_server:web
Microsoft
»
Windows Nt
»
Version:
4.0
cpe:2.3:o:microsoft:windows_nt:4.0
Microsoft
»
Windows Xp
»
Version:
Any
cpe:2.3:o:microsoft:windows_xp:*
Microsoft
»
Windows Xp
»
Version:
N/A
cpe:2.3:o:microsoft:windows_xp:-
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved