SMB: MAILSLOT Heap Overflow

This signature detects attempts to exploit a known vulnerability in the SMB protocol. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Extended Description

The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.

Affected Products

Microsoft windows_2000

References

BugTraq: 18863

CVE: CVE-2006-3942

Short Name
SMB:MAILSLOT-OF
Severity
Minor
Recommended
False
Recommended Action
None
Category
SMB
Keywords
CVE-2006-1314 CVE-2006-3942 Heap MAILSLOT Overflow bid:18863
Release Date
07/11/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.5

7.8

Found a potential security threat?