[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Advisory 2006-03-11 DoS Vulnerability in
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Advisory 2006-03-11 DoS Vulnerability in
- From: "Johannes Schneider\r\n" <ichhabekeineemail@xxxxxxx>
- Date: Sat, 11 Mar 2006 22:44:16 -0800
Microsoft Windows 2000
Message-ID: <f52933478a508c2c50e2790b36a40270@xxxxxxxxxxxxxxxx>
X-Priority: 3
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="iso-8859-1"
Advisory 2006-03-11 DoS Vulnerability in
Microsoft Windows 2000
I. BACKGROUND
Advisory marked for immediate release.
II. DESCRIPTION
Sending a specially crafted malformed packet to the services communication
socket can create a loss of service.
III. HISTORY
This advisory has no history.
IV. WORKAROUND
There are no known workarounds.
V. VENDOR RESPONSE
Microsoft Windows 2000 has not commented on this issue.
VI. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-541517 to this issue.
APPENDIX A. - Vendor Information
http://www.microsoft.com
APPENDIX B. - References
NONE
CONTACT:
*Johannes Schneider
bantown@xxxxxxx
*1-888-LOL-WHAT
*CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/