CVE-2006-3942
Microsoft Windows 2000 - Improper Input Validation
Title source: ruleDescription
The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.
Exploits (3)
metasploit
WORKING POC
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb
metasploit
WORKING POC
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb
References (14)
Scores
EPSS
0.8620
EPSS Percentile
99.4%
Details
CWE
CWE-20
Status
published
Products (6)
microsoft/windows_2000
microsoft/windows_2003_server
64-bit
microsoft/windows_2003_server
itanium
microsoft/windows_2003_server
r2
microsoft/windows_2003_server
sp1 (2 CPE variants)
microsoft/windows_xp
(3 CPE variants)
Published
Jul 31, 2006
Tracked Since
Feb 18, 2026