The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.
2006-07-31T23:04:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2003_server | 64-bit | Yes |
Operating System | microsoft | windows_2003_server | itanium | Yes |
Operating System | microsoft | windows_2003_server | r2 | Yes |
Operating System | microsoft | windows_2003_server | sp1 | Yes |
Operating System | microsoft | windows_2003_server | sp1 | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |