lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <f4fa96c848711f46e1984bf41e77c5ef@www.c0replay.net> Date: Sun Mar 12 06:36:55 2006 From: labs-no-reply at idefense.com (iDEFENSE Labs) Subject: Advisory 2006-03-11DoS Vulnerability in Microsoft Windows 2003 Advisory 2006-03-11 DoS Vulnerability in Microsoft Windows 2003 I. BACKGROUND Advisory marked for immediate release. II. DESCRIPTION Sending a specially crafted malformed packet to the services communication socket can create a loss of service. III. HISTORY This advisory has no history. IV. WORKAROUND There are no known workarounds. V. VENDOR RESPONSE Microsoft Windows 2003 has not commented on this issue. VI. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-227302 to this issue. APPENDIX A. - Vendor Information http://www.microsoft.com APPENDIX B. - References NONE CONTACT: *iDEFENSE Labs bantown@...m.la *1-888-LOL-WHAT *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS