Vulnerability Details : CVE-2006-1314
Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to execute arbitrary code via crafted first-class Mailslot messages that triggers memory corruption and bypasses size restrictions on second-class Mailslot messages.
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2006-1314
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1314
76.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1314
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1314
-
http://www.kb.cert.org/vuls/id/189140
US Government Resource
-
http://www.securityfocus.com/archive/1/439773/100/0/threaded
-
http://www.tippingpoint.com/security/advisories/TSRT-06-02.html
Patch;Vendor Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A600
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26818
-
http://www.us-cert.gov/cas/techalerts/TA06-192A.html
US Government Resource
-
http://www.vupen.com/english/advisories/2006/2753
-
http://securityreason.com/securityalert/1212
-
http://www.securityfocus.com/bid/18863
Jump to