CVE-2006-3880
Microsoft Windows 2000 - Denial of Service
Title source: ruleDescription
Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote attackers to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in certain TCP header fields, as demonstrated by the Achilles Windows Attack Tool. NOTE: the researcher reports that the Microsoft Security Response Center has stated "Our investigation which has included code review, review of the TCPDump, and attempts on reproing the issue on multiple fresh installs of various Windows Operating Systems have all resulted in non confirmation.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by J. Oquendo · cdoswindows
https://www.exploit-db.com/exploits/28263
Scores
EPSS
0.1773
EPSS Percentile
95.1%
Details
Status
published
Products (12)
microsoft/windows_2000
(5 CPE variants)
microsoft/windows_2003_server
datacenter_edition (2 CPE variants)
microsoft/windows_2003_server
datacenter_edition_64-bit (2 CPE variants)
microsoft/windows_2003_server
enterprise_64-bit
microsoft/windows_2003_server
enterprise_edition sp1
microsoft/windows_2003_server
enterprise_edition_64-bit
microsoft/windows_2003_server
r2
microsoft/windows_2003_server
sp1
microsoft/windows_2003_server
standard (2 CPE variants)
microsoft/windows_2003_server
standard_64-bit
... and 2 more
Published
Jul 27, 2006
Tracked Since
Feb 18, 2026