First published: Tue May 09 2006(Updated: )
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Distributed Transaction Coordinator | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =enterprise_64-bit | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0034 is classified as critical due to the potential for remote code execution.
To mitigate CVE-2006-0034, apply the latest security patches provided by Microsoft for affected versions.
CVE-2006-0034 affects Microsoft Distributed Transaction Coordinator on Windows NT 4.0 and Windows 2000, including various service packs.
Yes, CVE-2006-0034 can be exploited remotely by attackers sending specially crafted requests.
While disabling the Distributed Transaction Coordinator service may prevent exploitation of CVE-2006-0034, it is recommended to apply the official patches.