7.5
HIGH
CVE-2006-0034
Microsoft Distributed Transaction Coordinator (MSDTC) Heap-based Buffer Overflow Vulnerability
Description

Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability.

INFO

Published Date :

May 10, 2006, 2:14 a.m.

Last Modified :

Nov. 21, 2024, 12:05 a.m.

Remotely Exploitable :

Yes !

Impact Score :

6.4

Exploitability Score :

10.0
Public PoC/Exploit Available at Github

CVE-2006-0034 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2006-0034 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft windows_2000
2 Microsoft windows_2003_server
3 Microsoft windows_xp
4 Microsoft windows_nt
5 Microsoft distributed_transaction_coordinator
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2006-0034.

URL Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0238.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0269.html
http://secunia.com/advisories/20000 Patch Vendor Advisory
http://securityreason.com/securityalert/863
http://securitytracker.com/id?1016047
http://www.eeye.com/html/research/advisories/AD20060509a.html Patch Vendor Advisory
http://www.osvdb.org/25335
http://www.securityfocus.com/archive/1/433430/100/0/threaded
http://www.securityfocus.com/archive/1/433677/100/0/threaded
http://www.securityfocus.com/bid/17906 Patch
http://www.vupen.com/english/advisories/2006/1742 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018
https://exchange.xforce.ibmcloud.com/vulnerabilities/25559
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1222
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1908
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0238.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0269.html
http://secunia.com/advisories/20000 Patch Vendor Advisory
http://securityreason.com/securityalert/863
http://securitytracker.com/id?1016047
http://www.eeye.com/html/research/advisories/AD20060509a.html Patch Vendor Advisory
http://www.osvdb.org/25335
http://www.securityfocus.com/archive/1/433430/100/0/threaded
http://www.securityfocus.com/archive/1/433677/100/0/threaded
http://www.securityfocus.com/bid/17906 Patch
http://www.vupen.com/english/advisories/2006/1742 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018
https://exchange.xforce.ibmcloud.com/vulnerabilities/25559
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1222
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1908

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 6 years, 5 months ago
1 stars 0 fork 0 watcher
Born at : Aug. 28, 2015, 5:48 p.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2006-0034 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2006-0034 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0238.html
    Added Reference http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0269.html
    Added Reference http://secunia.com/advisories/20000
    Added Reference http://securityreason.com/securityalert/863
    Added Reference http://securitytracker.com/id?1016047
    Added Reference http://www.eeye.com/html/research/advisories/AD20060509a.html
    Added Reference http://www.osvdb.org/25335
    Added Reference http://www.securityfocus.com/archive/1/433430/100/0/threaded
    Added Reference http://www.securityfocus.com/archive/1/433677/100/0/threaded
    Added Reference http://www.securityfocus.com/bid/17906
    Added Reference http://www.vupen.com/english/advisories/2006/1742
    Added Reference https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018
    Added Reference https://exchange.xforce.ibmcloud.com/vulnerabilities/25559
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1222
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1477
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1908
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:*:server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:*:professional:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:professional:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:datacenter_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:*:datacenter_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:advanced_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:*:advanced_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:professional:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:datacenter_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:advanced_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:professional:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:datacenter_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:advanced_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:professional:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:datacenter_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 30, 2019

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:advanced_server:*:*:*:*:* OR *cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 19, 2018

    Action Type Old Value New Value
    Removed Reference http://www.securityfocus.com/archive/1/archive/1/433677/100/0/threaded [No Types Assigned]
    Removed Reference http://www.securityfocus.com/archive/1/archive/1/433430/100/0/threaded [Patch]
    Added Reference http://www.securityfocus.com/archive/1/433677/100/0/threaded [No Types Assigned]
    Added Reference http://www.securityfocus.com/archive/1/433430/100/0/threaded [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 12, 2018

    Action Type Old Value New Value
    Removed Reference http://www.microsoft.com/technet/security/bulletin/ms06-018.mspx [Patch]
    Added Reference https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 11, 2017

    Action Type Old Value New Value
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1222 [Tool Signature, US Government Resource]
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1477 [Tool Signature, US Government Resource]
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1908 [Tool Signature, US Government Resource]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1908 [No Types Assigned]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1477 [No Types Assigned]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1222 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 20, 2017

    Action Type Old Value New Value
    Removed Reference http://xforce.iss.net/xforce/xfdb/25559 [No Types Assigned]
    Added Reference https://exchange.xforce.ibmcloud.com/vulnerabilities/25559 [No Types Assigned]
  • Initial Analysis by [email protected]

    May. 10, 2006

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

57.26 }} -20.64%

score

0.97834

percentile

CVSS2 - Vulnerability Scoring System
Access Vector
Access Complexity
Authentication
Confidentiality
Integrity
Availability