First published: Tue Jul 11 2006(Updated: )
Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to execute arbitrary code via crafted first-class Mailslot messages that triggers memory corruption and bypasses size restrictions on second-class Mailslot messages.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2003 Server | =64-bit | |
Microsoft Windows 2003 Server | =itanium | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1314 has a critical severity level due to its potential for remote code execution.
To fix CVE-2006-1314, apply the relevant security patches provided by Microsoft for affected Windows versions.
CVE-2006-1314 affects Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Windows Server 2003 up to SP1.
CVE-2006-1314 is an exploit that takes advantage of a heap-based buffer overflow vulnerability.
Yes, CVE-2006-1314 can potentially lead to data breaches as it allows remote attackers to execute arbitrary code.