First published: Wed Aug 09 2006(Updated: )
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2003 Server | =64-bit | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3440 is rated as a critical vulnerability because it allows remote attackers to execute arbitrary code.
To mitigate CVE-2006-3440, apply the latest security patches provided by Microsoft for affected Windows versions.
CVE-2006-3440 impacts Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Windows Server 2003 SP1.
Exploitation of CVE-2006-3440 can lead to complete system compromise, allowing attackers to execute arbitrary code.
Yes, CVE-2006-3440 is part of ongoing security concerns regarding buffer overflow vulnerabilities in network services.