CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.0%
There is a vulnerability in the Microsoft Windows Routing and Remote Access Service that could allow an attacker to take control of the affected system.
The Routing and Remote Access Service (RRAS) allows computers running the Windows 2000, XP, and Server 2003 operating systems to act as dial-up remote access server, virtual private network (VPN) server, Internet Protocol (IP) router, network address translator (NAT), and a dial-up and VPN site-to-site demand-dial router. RRAS replaced Remote Access Service (RAS) which was in Microsoft Windows NT.
There is an buffer overflow in the way Routing and Remote Access service handles RPC requests.
Microsoft reports that Windows 2000, Windows XP and Windows Server 2003 are vulnerable, but the RRAS service is not started by default on any platform except Windows 2000 Service Pack 4. Windows98 and Windows ME are not vulnerable. End-of-life Microsoft operating systems that use ICS (Internet Connection Sharing) may be vulnerable. Also, Microsoft ISA server requires the installation of a Windows 2000 or 2003 server operating system.
Exploit code for this vulnerability is publicly available.
A remote attacker could execute arbitrary code on a vulnerable system. This includes installing programs, viewing, changing or deleting data. The attacker may also create a denial-of-service condition.
Apply an Update
Apply the updates found in MS06-025.
Restrict Access
Restrict access to trusted hosts for ports 135/udp, 137/udp, 138/udp, 445/udp, 135/tcp, 139/tcp, 445/tcp, 593/tcp
and any other ports used for RPC connections. Please see Microsoft Knowledgebase articles 826382, 309798, 313190, and 813878 for information about RPC ports and filtering.
Disable Unnecessary Services
Do not Enable the Routing and Remote Access Service if it is not needed.
631516
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: June 13, 2006 Updated: July 31, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Microsoft for the information provided in MS06-025.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-2370 |
---|---|
Severity Metric: | 1.20 Date Public: |