Show plain JSON{"id": "CVE-2006-3880", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "cve@mitre.org"}], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-07-27T01:04:00.000", "references": [{"url": "http://securityreason.com/securityalert/1282", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/441007/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/19135", "tags": ["Exploit"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote attackers to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in certain TCP header fields, as demonstrated by the Achilles Windows Attack Tool. NOTE: the researcher reports that the Microsoft Security Response Center has stated \"Our investigation which has included code review, review of the TCPDump, and attempts on reproing the issue on multiple fresh installs of various Windows Operating Systems have all resulted in non confirmation."}, {"lang": "es", "value": "** IMPUGNADO ** Microsoft Windows NT 4.0, Windows 2000, Windows XP, y Windows Small Business Server 2003 permite a atacantes remotos provocar denegaci\u00f3n de servicio (manipular la pila IP) a trav\u00e9s de un flujo continuo de paquetes sobre el puerto TCP 135 que tiene una cabecera de validaci\u00f3n (checksum) TCP erronea y n\u00fameros aleatorios en ciertos campos de cabeceras TCP, como se demostr\u00f3 con Achilles Windows Attack Tool. NOTA: el investigador indicaque Microsoft Security Response Center ha indicado que \"Nuestra investigaci\u00f3n que ha incluido la revisi\u00f3n de c\u00f3digo, la revisi\u00f3n del TCPDump, e intent\u00f3 reproducir el asunto en m\u00faltiples instalaciones frescas de varios sistemas operativos de Windows dieron como resultado la no confirmaci\u00f3n\"."}], "lastModified": "2024-05-17T00:29:43.337", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "480D8321-EB2F-4626-A16B-F3C2B771EDB3"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3538DA2-B040-426D-9ADC-7C5BE9C2D4E4"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F633513-6E9A-4F2D-964A-6AFDE5307AD7"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ED8947F-2490-41CA-A7B3-2C93D69C3F8E"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B127407D-AE50-4AFE-A780-D85B5AF44A2D"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6E3EB90-92C9-4B69-B58C-087D382DC579"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3AF27C8-C2FA-477D-8332-B96277530B4E"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34ACB544-87DD-4D9A-99F0-A10F48C1EE05"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E9E190B-A109-4177-A5B5-7BD32573762E"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "709E6DA0-09F8-4EAB-B1B2-D4D0A7771AC1"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B5F54BB-A80E-42F2-A700-82C1240E23D0"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3AC387D-BB23-4EB9-A7DA-6E3F5CD8EFD7"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B518E945-5FDE-4A37-878D-6946653C91F7"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76BDFB16-D71F-4E33-83FD-F0F2AE2FAE7F"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "403945FA-8676-4D98-B903-48452B46F48F"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A05337E-18A5-4939-85A0-69583D9B5AD9"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB2BE2DE-7B06-47ED-A674-15D45448F357"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}