Description
Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.
Published: 2006-08-09
Score: 10.0 Critical
EPSS: 73.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.73928}

epss

{'score': 0.74294}


Subscriptions

Microsoft Windows 2000 Windows 2003 Server Windows Xp
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-07T18:30:33.285Z

Reserved: 2006-07-07T00:00:00.000Z

Link: CVE-2006-3441

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-08-09T01:04:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2006-3441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses