Overview
A buffer overflow vulnerability in Microsoft Winsock may allow a remote attacker to execute arbitrary code on an affected system.
Description
Winsock (Windows Socket 2) allows network applications to relay data across a network regardless of the network protocol being used. Microsoft's Winsock contains a buffer overflow vulnerability that can allow a remote attacker to execute arbitrary code and gain control of the affected system. Exploitation of this vulnerability occurs when the remote attacker can convince the user to open a specially crafted file or website. Microsoft's bulletin states that the following Windows operating systems are affected by this vulnerability:
|
Impact
A remote attacker who can successfully convince a user to open a specially crafted file or website may be able to execute arbitrary code and gain control of the affected system. |
Solution
Apply an update |
Workaround
* Note that this workaround does NOT fix the underlying vulnerability but will help block known methods of attack. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Microsoft Security for reporting this vulnerability in Microsoft Security Bulletin MS06-041. Microsoft, in turn, thanks Peter Winter Smith of NGS Software for reporting the vulnerability to them.
This document was written by Katie Washok.
Other Information
CVE IDs: | CVE-2006-3440 |
Severity Metric: | 12.83 |
Date Public: | 2006-08-08 |
Date First Published: | 2006-08-08 |
Date Last Updated: | 2006-08-08 21:09 UTC |
Document Revision: | 28 |