Vulnerability Note VU#257164

Microsoft DHCP Client service contains a buffer overflow

Original Release date: 11 Jul 2006 | Last revised: 13 Jul 2006


Microsoft DHCP Client service contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.


Dynamic Host Configuration Protocol (DHCP)

As described in RFC 2131, "The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network."

The Problem

The Microsoft DHCP Client service contains a buffer overflow. If a remote attacker responds to a DHCP request with a specially crafted DHCP response, that attacker may be able to trigger the buffer overflow on the requesting system.

For more information refer to Microsoft Security Bulletin MS06-036.


A remote, unauthenticated attacker may be able to execute arbitrary code.


Apply a patch from your vendor

Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-036.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-11 Jul 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported in Microsoft Security Bulletin MS06-036 . Microsoft credits Mariano Nuņez Di Croce of Cybsec Security Systems for providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-2372
  • Date Public: 11 Jul 2006
  • Date First Published: 11 Jul 2006
  • Date Last Updated: 13 Jul 2006
  • Severity Metric: 78.00
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.