var-200607-0397
Vulnerability from variot
The SMB Mailslot parsing functionality in PAM in multiple ISS products with XPU (24.39/1.78/epj/x.x.x.1780), including Proventia A, G, M, Server, and Desktop, BlackICE PC and Server Protection 3.6, and RealSecure 7.0, allows remote attackers to cause a denial of service (infinite loop) via a crafted SMB packet that is not properly handled by the SMB_Mailslot_Heap_Overflow decode. ISS The product includes 2006 Year 7 Monthly release XPU include "SMB_MailSlot_Heap_Overflow" Defect in decoding, certain legitimate SMB Mailslot When analyzing traffic, Protocol Analysis Module (PAM) Engine stops responding to subsequent traffic and disrupts service operation (DoS) There is a vulnerability that becomes a condition.ISS Protection product interferes with service operation (DoS) It may be in a state. The Internet Security Systems implementation of SMB/TCP Mailslot is prone to a denial-of-service vulnerability. This issue is due to a design error when dealing with certain legitimate SMB Mailslot traffic. An attacker can exploit this issue to crash the affected service, effectively denying service to legitimate users. ISS is an internationally renowned security vendor that provides a variety of firewalls and intrusion detection devices. An attacker only needs to send a single packet to trigger this vulnerability without actually establishing an SMB session.
Hardcore Disassembler / Reverse Engineer Wanted!
Want to work with IDA and BinDiff? Want to write PoC's and Exploits?
Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package.
Successful exploitation causes the application or system to stop responding.
SOLUTION: Update to a fixed version (see vendor advisory for details).
ORIGINAL ADVISORY: ISS: http://xforce.iss.net/xforce/alerts/id/230 https://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630
NSFocus: http://www.nsfocus.com/english/homepage/research/0607.htm
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. NSFOCUS Security Advisory (SA2006-07)
ISS RealSecure/BlackICE MailSlot Heap Overflow Detection Remote DoS Vulnerability
Release Date: 2006-07-27
CVE ID: CVE-2006-3840
http://www.nsfocus.com/english/homepage/research/0607.htm
Affected systems & software
RealSecure Network Sensor 7.0 Proventia A Series Proventia G Series Proventia M Series RealSecure Server Sensor 7.0 Proventia Server RealSecure Desktop 7.0 Proventia Desktop BlackICE PC Protection 3.6 BlackICE Server Protection 3.6
Unaffected systems & software
Summary
NSFocus Security Team discovered a remote DoS vulnerability in ISS RealSecure/ BlackICE products lines' detection of MailSlot Heap Overflow (MS06-035). By sending a specific SMB MailSlot packet it's possible to cause DoS in ISS protection products.
Description
There is a DoS vulnerability in ISS protection products' detection of SMB_MailSlot_Heap_Overflow (MS06-035/KB917159). By sending a specific SMB MailSlot packet it's possible to cause an infinite loop to occur in the detection code, and the ISS product or even the operating system will stop to respond. For example, for BlackICE the vulnerability might cause the inerruption of the network traffic, and an approximately 100% CPU utilization. STOP BlackICE engine will not restore normal operation. Instead OS restart is required.
This vulnerability can be triggered by a single packet. The establishment of a real SMB session is not required.
Workaround
Block ports TCP/445 and TCP/139 at the firewall.
Vendor Status
2006.07.24 Informed the vendor 2006.07.25 Vendor confirmed the vulnerability 2006.07.26 ISS has released a security alert and related patches.
For more details about the security alert, please refer to: http://xforce.iss.net/xforce/alerts/id/230
ISS has released the following XPUs to fix this vulnerability:
RealSecure Network 7.0, XPU 24.40 Proventia A Series, XPU 24.40 Proventia G Series, XPU 24.40/1.79 Proventia M Series, XPU 1.79 RealSecure Server Sensor 7.0, XPU 24.40 Proventia Server 1.0.914.1880 RealSecure Desktop 7.0 epk Proventia Desktop 8.0.812.1790/8.0.675.1790 BlackICE PC Protection 3.6 cpk BlackICE Server Protection 3.6 cpk
Additional Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-3840 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. Candidates may change significantly before they become official CVE entries.
Acknowledgment
Chen Qing of NSFocus Security Team found the vulnerability.
DISCLAIMS
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED, EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE ADVISORY IS NOT MODIFIED IN ANY WAY.
Copyright 1999-2006 NSFOCUS. All Rights Reserved. Terms of use.
NSFOCUS Security Team security@nsfocus.com NSFOCUS INFORMATION TECHNOLOGY CO.,LTD (http://www.nsfocus.com)
PGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc Key fingerprint = F8F2 F5D1 EF74 E08C 02FE 1B90 D7BF 7877 C6A6 F6DA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200607-0397", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "blackice pc protection", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "3.6cpk" }, { "model": "realsecure desktop", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "7.0epk" }, { "model": "proventia desktop", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "8.0.675.1790" }, { "model": "blackice server protection", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "3.6cpk" }, { "model": "realsecure network", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "7.0" }, { "model": "proventia desktop", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "8.0.812.1790" }, { "model": "realsecure server sensor", "scope": "eq", "trust": 1.6, "vendor": "iss", "version": "7.0" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 1.0, "vendor": "iss", "version": "*" }, { "model": "proventia m series xpu", "scope": "eq", "trust": 1.0, "vendor": "iss", "version": "*" }, { "model": "proventia server", "scope": "eq", "trust": 1.0, "vendor": "iss", "version": "1.0.914.1880" }, { "model": "proventia a series xpu", "scope": "eq", "trust": 1.0, "vendor": "iss", "version": "*" }, { "model": "blackice pc protection", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "3.6 cpk" }, { "model": "blackice server protection", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "3.6 cpk" }, { "model": "proventia a series", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "xpu 24.40" }, { "model": "proventia desktop", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "8.0.812.1790" }, { "model": "proventia g series", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "xpu 24.40/1.79" }, { "model": "proventia m series", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "xpu 1.79" }, { "model": "proventia server", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "for linux xpu 1.79" }, { "model": "realsecure desktop", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "7.0 epk" }, { "model": "realsecure network sensor", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "7.0 xpu 24.40" }, { "model": "realsecure server sensor", "scope": "lt", "trust": 0.8, "vendor": "the internet security", "version": "7.0 xpu 24.40" }, { "model": "proventia g series xpu", "scope": null, "trust": 0.6, "vendor": "iss", "version": null }, { "model": "proventia a series xpu", "scope": null, "trust": 0.6, "vendor": "iss", "version": null }, { "model": "proventia m series xpu", "scope": null, "trust": 0.6, "vendor": "iss", "version": null }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.9" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.8" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.7" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.6" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.5" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.4" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.3" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.2" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.12" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.11" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.10" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.1" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.020.19" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.020.18" }, { "model": "security systems realsecure server sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.020.16" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.4" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.9" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.8" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.7" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.6" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.022.10" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.020.12" }, { "model": "security systems realsecure network sensor xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.020.11" }, { "model": "security systems realsecure network sensor", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebm", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebl", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebk", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebj", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebh", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebg", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop ebf", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems realsecure desktop eba", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "7.0" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.9" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.8" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.7" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.6" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.5" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.4" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.3" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.2" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.10" }, { "model": "security systems proventia m series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "1.1" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.9" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.10" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "20.15" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "20.14" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "20.13" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "20.12" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "20.11" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.8" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.7" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.6" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.5" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.4" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.3" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.2" }, { "model": "security systems proventia a series xpu", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "22.1" }, { "model": "security systems blackice server protection coq", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cop", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coo", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection con", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection com", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection col", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cok", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coj", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coi", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coh", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cog", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cof", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coe", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cod", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coc", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cob", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection coa", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cch", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection ccg", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection ccf", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cce", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection ccd", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection ccc", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection ccb", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cca", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cbz", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection cbr", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice server protection .cno", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cch", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection ccg", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection ccf", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cce", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection ccd", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection ccc", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection ccb", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cca", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cbz", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cbr", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection cbd", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection .cno", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "security systems blackice pc protection .cbz", "scope": "eq", "trust": 0.3, "vendor": "internet", "version": "3.6" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.9" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.8" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.7" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.6" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.5" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.4" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.3" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.2" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.12" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.11" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.10" }, { "model": "proventia g series xpu", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "22.1" } ], "sources": [ { "db": "BID", "id": "19178" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:realsecure_network:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:realsecure_server_sensor:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:blackice_pc_protection:3.6cpk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:blackice_server_protection:3.6cpk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:proventia_desktop:8.0.675.1790:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iss:proventia_desktop:8.0.812.1790:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:iss:proventia_a_series_xpu:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:iss:proventia_g_series_xpu:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:iss:proventia_m_series_xpu:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:iss:proventia_server:1.0.914.1880:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-3840" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nsfocus Security team security@nsfocus.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200607-462" } ], "trust": 0.6 }, "cve": "CVE-2006-3840", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2006-3840", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-19948", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-3840", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200607-462", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-19948", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-19948" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SMB Mailslot parsing functionality in PAM in multiple ISS products with XPU (24.39/1.78/epj/x.x.x.1780), including Proventia A, G, M, Server, and Desktop, BlackICE PC and Server Protection 3.6, and RealSecure 7.0, allows remote attackers to cause a denial of service (infinite loop) via a crafted SMB packet that is not properly handled by the SMB_Mailslot_Heap_Overflow decode. ISS The product includes 2006 Year 7 Monthly release XPU include \"SMB_MailSlot_Heap_Overflow\" Defect in decoding, certain legitimate SMB Mailslot When analyzing traffic, Protocol Analysis Module (PAM) Engine stops responding to subsequent traffic and disrupts service operation (DoS) There is a vulnerability that becomes a condition.ISS Protection product interferes with service operation (DoS) It may be in a state. The Internet Security Systems implementation of SMB/TCP Mailslot is prone to a denial-of-service vulnerability. This issue is due to a design error when dealing with certain legitimate SMB Mailslot traffic. \nAn attacker can exploit this issue to crash the affected service, effectively denying service to legitimate users. ISS is an internationally renowned security vendor that provides a variety of firewalls and intrusion detection devices. An attacker only needs to send a single packet to trigger this vulnerability without actually establishing an SMB session. \n\n----------------------------------------------------------------------\n\nHardcore Disassembler / Reverse Engineer Wanted!\n\nWant to work with IDA and BinDiff?\nWant to write PoC\u0027s and Exploits?\n\nYour nationality is not important. \nWe will get you a work permit, find an apartment, and offer a\nrelocation compensation package. \n\nSuccessful exploitation causes the application or system to stop\nresponding. \n\nSOLUTION:\nUpdate to a fixed version (see vendor advisory for details). \n\nORIGINAL ADVISORY:\nISS:\nhttp://xforce.iss.net/xforce/alerts/id/230\nhttps://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630\n\nNSFocus:\nhttp://www.nsfocus.com/english/homepage/research/0607.htm\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. NSFOCUS Security Advisory (SA2006-07)\n\nISS RealSecure/BlackICE MailSlot Heap Overflow Detection Remote DoS Vulnerability\n\nRelease Date: 2006-07-27\n\nCVE ID: CVE-2006-3840\n\nhttp://www.nsfocus.com/english/homepage/research/0607.htm\n\nAffected systems \u0026 software\n===================\n\nRealSecure Network Sensor 7.0\nProventia A Series\nProventia G Series\nProventia M Series\nRealSecure Server Sensor 7.0\nProventia Server\nRealSecure Desktop 7.0\nProventia Desktop\nBlackICE PC Protection 3.6\nBlackICE Server Protection 3.6\n\nUnaffected systems \u0026 software\n===================\n\n\nSummary\n=========\n\nNSFocus Security Team discovered a remote DoS vulnerability in ISS RealSecure/\nBlackICE products lines\u0027 detection of MailSlot Heap Overflow (MS06-035). By\nsending a specific SMB MailSlot packet it\u0027s possible to cause DoS in ISS\nprotection products. \n\nDescription\n============\n\nThere is a DoS vulnerability in ISS protection products\u0027 detection of SMB_MailSlot_Heap_Overflow\n(MS06-035/KB917159). By sending a specific SMB MailSlot packet it\u0027s possible\nto cause an infinite loop to occur in the detection code, and the ISS product \nor even the operating system will stop to respond. For example, for BlackICE \nthe vulnerability might cause the inerruption of the network traffic, \nand an approximately 100% CPU utilization. STOP BlackICE engine will not restore\nnormal operation. Instead OS restart is required. \n\nThis vulnerability can be triggered by a single packet. The establishment of \na real SMB session is not required. \n\nWorkaround\n=============\n\nBlock ports TCP/445 and TCP/139 at the firewall. \n \nVendor Status\n==============\n\n2006.07.24 Informed the vendor\n2006.07.25 Vendor confirmed the vulnerability\n2006.07.26 ISS has released a security alert and related patches. \n \nFor more details about the security alert, please refer to:\nhttp://xforce.iss.net/xforce/alerts/id/230\n\nISS has released the following XPUs to fix this vulnerability:\n\nRealSecure Network 7.0, XPU 24.40\nProventia A Series, XPU 24.40\nProventia G Series, XPU 24.40/1.79\nProventia M Series, XPU 1.79\nRealSecure Server Sensor 7.0, XPU 24.40\nProventia Server 1.0.914.1880\nRealSecure Desktop 7.0 epk\nProventia Desktop 8.0.812.1790/8.0.675.1790\nBlackICE PC Protection 3.6 cpk\nBlackICE Server Protection 3.6 cpk\n\nAdditional Information\n========================\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2006-3840 to this issue. This is a candidate for inclusion in the \nCVE list (http://cve.mitre.org), which standardizes names for security problems. \nCandidates may change significantly before they become official CVE entries. \n\nAcknowledgment\n===============\n\nChen Qing of NSFocus Security Team found the vulnerability. \n\nDISCLAIMS\n==========\nTHE INFORMATION PROVIDED IS RELEASED BY NSFOCUS \"AS IS\" WITHOUT WARRANTY\nOF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED,\nEXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS\nBE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,\nINCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,\nEVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. \nDISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE\nADVISORY IS NOT MODIFIED IN ANY WAY. \n\nCopyright 1999-2006 NSFOCUS. All Rights Reserved. Terms of use. \n\n\nNSFOCUS Security Team \u003csecurity@nsfocus.com\u003e\nNSFOCUS INFORMATION TECHNOLOGY CO.,LTD\n(http://www.nsfocus.com)\n\nPGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc\nKey fingerprint = F8F2 F5D1 EF74 E08C 02FE 1B90 D7BF 7877 C6A6 F6DA\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "BID", "id": "19178" }, { "db": "VULHUB", "id": "VHN-19948" }, { "db": "PACKETSTORM", "id": "48616" }, { "db": "PACKETSTORM", "id": "48652" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-3840", "trust": 2.9 }, { "db": "BID", "id": "19178", "trust": 2.8 }, { "db": "SECTRACK", "id": "1016591", "trust": 2.5 }, { "db": "SECTRACK", "id": "1016592", "trust": 2.5 }, { "db": "SECTRACK", "id": "1016590", "trust": 2.5 }, { "db": "SECUNIA", "id": "21219", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2006-2996", "trust": 1.7 }, { "db": "XF", "id": "27965", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2006-000458", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200607-462", "trust": 0.7 }, { "db": "ISS", "id": "20060726 PROTOCOL PARSING BUG IN SMB MAILSLOT PARSING IN ISS PRODUCTS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060727 NSFOCUS SA2006-07 : ISS REALSECURE/BLACKICE MAILSLOT HEAP OVERFLOW DETECTION REMOTE DOS VULNERABILITY", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "48652", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-19948", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "48616", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-19948" }, { "db": "BID", "id": "19178" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "PACKETSTORM", "id": "48616" }, { "db": "PACKETSTORM", "id": "48652" }, { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "id": "VAR-200607-0397", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-19948" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:45:17.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "3630", "trust": 0.8, "url": "https://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630" }, { "title": "230", "trust": 0.8, "url": "http://xforce.iss.net/xforce/alerts/id/230" }, { "title": "smb_mailslot_230", "trust": 0.8, "url": "http://www.isskk.co.jp/support/techinfo/general/smb_mailslot_230.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000458" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-19948" }, { "db": "NVD", "id": "CVE-2006-3840" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://xforce.iss.net/xforce/alerts/id/230" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/19178" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1016590" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1016591" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1016592" }, { "trust": 2.1, "url": "https://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=3630" }, { "trust": 1.9, "url": "http://www.nsfocus.com/english/homepage/research/0607.htm" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21219" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/2996" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/27965" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/441278/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/2996" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3840" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-3840" }, { "trust": 0.8, "url": "http://www.isskk.co.jp/support/techinfo/general/smb_mailslot_230.html" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/441278/100/0/threaded" }, { "trust": 0.3, "url": "/archive/1/441278" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21219/" }, { "trust": 0.1, "url": "http://secunia.com/product/2356/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/2348/" }, { "trust": 0.1, "url": "http://secunia.com/product/1702/" }, { "trust": 0.1, "url": "http://secunia.com/product/2160/" }, { "trust": 0.1, "url": "http://secunia.com/product/465/" }, { "trust": 0.1, "url": "http://secunia.com/product/11161/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/product/2349/" }, { "trust": 0.1, "url": "http://secunia.com/product/5689/" }, { "trust": 0.1, "url": "http://secunia.com/product/2363/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2347/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org)," }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3840" }, { "trust": 0.1, "url": "http://www.nsfocus.com/homepage/research/pgpkey.asc" }, { "trust": 0.1, "url": "http://www.nsfocus.com)" } ], "sources": [ { "db": "VULHUB", "id": "VHN-19948" }, { "db": "BID", "id": "19178" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "PACKETSTORM", "id": "48616" }, { "db": "PACKETSTORM", "id": "48652" }, { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-19948" }, { "db": "BID", "id": "19178" }, { "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "db": "PACKETSTORM", "id": "48616" }, { "db": "PACKETSTORM", "id": "48652" }, { "db": "NVD", "id": "CVE-2006-3840" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-07-27T00:00:00", "db": "VULHUB", "id": "VHN-19948" }, { "date": "2006-07-26T00:00:00", "db": "BID", "id": "19178" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "date": "2006-07-28T01:04:26", "db": "PACKETSTORM", "id": "48616" }, { "date": "2006-07-28T03:19:00", "db": "PACKETSTORM", "id": "48652" }, { "date": "2006-07-27T11:04:00", "db": "NVD", "id": "CVE-2006-3840" }, { "date": "2006-07-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-17T00:00:00", "db": "VULHUB", "id": "VHN-19948" }, { "date": "2006-07-28T23:22:00", "db": "BID", "id": "19178" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000458" }, { "date": "2018-10-17T21:31:50.767000", "db": "NVD", "id": "CVE-2006-3840" }, { "date": "2006-08-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200607-462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "48652" }, { "db": "CNNVD", "id": "CNNVD-200607-462" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ISS Product SMB Mailslot Service disruption in analysis (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000458" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200607-462" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.