Vulnerability Details : CVE-2006-4688

Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability."
Vulnerability category: OverflowMemory CorruptionExecute code
Published 2006-11-14 22:07:00
Updated 2018-10-17 21:39:07
View at NVD,   CVE.org
At least one public exploit which can be used to exploit this vulnerability exists!

Exploit prediction scoring system (EPSS) score for CVE-2006-4688

Probability of exploitation activity in the next 30 days: 96.84%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2006-4688

  • MS06-066 Microsoft Services nwapi32.dll Module Exploit
    Disclosure Date : 2006-11-14
    exploit/windows/smb/ms06_066_nwapi
    This module exploits a stack buffer overflow in the svchost service when the netware client service is running. This specific vulnerability is in the nwapi32.dll module. Authors: - pusscat <[email protected]>
  • MS06-066 Microsoft Services nwwks.dll Module Exploit
    Disclosure Date : 2006-11-14
    exploit/windows/smb/ms06_066_nwwks
    This module exploits a stack buffer overflow in the svchost service, when the netware client service is running. This specific vulnerability is in the nwapi32.dll module. Authors: - pusscat <[email protected]>

CVSS scores for CVE-2006-4688

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
[email protected]

References for CVE-2006-4688

Products affected by CVE-2006-4688

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!