vendor:
Windows Routing and Remote Access Service
by:
Nicolas Pouvesle, hdm
N/A
CVSS
N/A
Stack Buffer Overflow
119
CWE
Product Name: Windows Routing and Remote Access Service
Affected Version From: Windows 2000 SP4
Affected Version To: Windows XP SP1
Patch Exists: NO
Related CWE: CVE-2006-2370
CPE: o:microsoft:windows_2000::sp4, cpe:/o:microsoft:windows_xp::sp1
Other Scripts:
https://www.infosecmatter.com/nmap-nse-library/?nse=smb-vuln-ms06-025, https://www.infosecmatter.com/nessus-plugin-library/?id=21689, https://www.infosecmatter.com/nessus-plugin-library/?id=21696, https://www.infosecmatter.com/nessus-plugin-library/?id=29516, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/ms06_025_rasmans_reg, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/ms06_025_rras, https://www.infosecmatter.com/nessus-plugin-library/?id=23861, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?_page=22
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006
Microsoft RRAS Service Overflow
This module exploits a stack buffer overflow in the Windows Routing and Remote Access Service. Since the service is hosted inside svchost.exe, a failed exploit attempt can cause other system services to fail as well. A valid username and password is required to exploit this flaw on Windows 2000. When attacking XP SP1, the SMBPIPE option needs to be set to 'SRVSVC'.
Mitigation:
No known mitigation or remediation for this vulnerability