CVE-2006-2371 (CNNVD-200606-276)
中文标题:
Microsoft Windows RASMAN服务 栈溢出漏洞
英文标题:
Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Window...
漏洞描述
中文描述:
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows远程访问连接管理器(RASMAN)存在可远程调用的RPC接口,其中RPC接口 _RasRpcSubmitRequest存在若干安全漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。 函数_RasRpcSubmitRequest及其子函数对作为参数的函数指针的有效性检查不足;某些子函数对参数的处理存在缓冲区溢出漏洞;这些漏洞都可能被攻击者利用在服务器上执行任意指令,从而控制系统。
英文描述:
Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," that lead to registry corruption and stack corruption, aka the "RASMAN Registry Corruption Vulnerability."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | windows_2000 | * | - | - |
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | datacenter_edition | - | - |
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | datacenter_edition_64-bit | - | - |
cpe:2.3:o:microsoft:windows_2003_server:datacenter_edition_64-bit:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | enterprise_64-bit | - | - |
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | enterprise_edition | - | - |
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition:sp1:*:*:*:*:*:*
|
| microsoft | windows_2003_server | enterprise_edition_64-bit | - | - |
cpe:2.3:o:microsoft:windows_2003_server:enterprise_edition_64-bit:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | r2 | - | - |
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
|
| microsoft | windows_2003_server | sp1 | - | - |
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:enterprise:*:*:*:*:*
|
| microsoft | windows_2003_server | standard | - | - |
cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | standard_64-bit | - | - |
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*
|
| microsoft | windows_2003_server | web | - | - |
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
|
| microsoft | windows_xp | * | - | - |
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-2371 |
2025-11-11 15:17:42 | 2025-11-11 07:32:34 |
| NVD | nvd_CVE-2006-2371 |
2025-11-11 14:51:49 | 2025-11-11 07:41:19 |
| CNNVD | cnnvd_CNNVD-200606-276 |
2025-11-11 15:08:51 | 2025-11-11 07:49:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200606-276
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 12
- data_sources: ['cve'] -> ['cve', 'nvd']