CVE-2006-3880

Microsoft Windows 2000 - Denial of Service

Title source: rule

Description

Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote attackers to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in certain TCP header fields, as demonstrated by the Achilles Windows Attack Tool. NOTE: the researcher reports that the Microsoft Security Response Center has stated "Our investigation which has included code review, review of the TCPDump, and attempts on reproing the issue on multiple fresh installs of various Windows Operating Systems have all resulted in non confirmation.

Exploits (1)

exploitdb WORKING POC VERIFIED
by J. Oquendo · cdoswindows
https://www.exploit-db.com/exploits/28263

Scores

EPSS 0.1773
EPSS Percentile 95.1%

Details

Status published
Products (12)
microsoft/windows_2000 (5 CPE variants)
microsoft/windows_2003_server datacenter_edition (2 CPE variants)
microsoft/windows_2003_server datacenter_edition_64-bit (2 CPE variants)
microsoft/windows_2003_server enterprise_64-bit
microsoft/windows_2003_server enterprise_edition sp1
microsoft/windows_2003_server enterprise_edition_64-bit
microsoft/windows_2003_server r2
microsoft/windows_2003_server sp1
microsoft/windows_2003_server standard (2 CPE variants)
microsoft/windows_2003_server standard_64-bit
... and 2 more
Published Jul 27, 2006
Tracked Since Feb 18, 2026