Vulnerability Note VU#814644

Microsoft Remote Access Connection Manager service vulnerable to buffer overflow

Original Release date: 13 Jun 2006 | Last revised: 14 Jun 2006


A vulnerability in the Microsoft Remote Access Connection Manager may allow a remote attacker to execute arbitrary code on a vulnerable system.


Microsoft describes the Routing and Remote Access Service (RRAS) as follows:

    RRAS makes it possible for a computer to function as a network router. RRAS also provides the next generation of server functionality for the Remote Access Service (RAS) for Windows. The RRAS server functionality follows and builds upon the Remote Access Service (RAS) that was included in previous operating systems.

    The Remote Access Service lets users connect to a remote computer over phone lines, so they can work as if their system were physically connected to the remote network. These services enable remote users to do activities such as send and receive e-mail, fax documents, retrieve files, and print documents on an office printer.
    The Remote Access Service is a native service in Windows 2000, Windows XP and Windows Server 2003.

A buffer overflow vulnerability exists in a Remote Procedure Call (RPC) interface provided by the Remote Access Connection Manager (RASMAN) supplied with Microsoft Windows. Exploitation of this vulnerability can result in registry corruption and subsequent stack memory corruption on the affected system.


A remote attacker may be able to execute arbitrary code on an affected system. The attacker-supplied code would be execute with Local System privileges. Microsoft states:

    On Windows 2000 Service Pack 4 and Windows XP Service Pack 1, any anonymous user who could deliver a specially crafted message to the affected system could try to exploit this vulnerability. In order to exploit the vulnerability on Windows XP Service Pack 2 and Windows Server 2003, an attacker must have valid login credentials to a target system.


Apply a patch

Microsoft has published patches for this issue in Microsoft Security Bulletin MS06-025.


In addition to the patches, Microsoft has also published a number of workarounds for this issue in Microsoft Security Bulletin MS06-025. Users, particularly those who are unable to apply the patch, are encouraged to implement these workarounds.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Jun 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Peter Winter-Smith of NGS Software with reporting this vulnerability to them.

This document was written by Chad R Dougherty.

Other Information

  • CVE IDs: CVE-2006-2371
  • Date Public: 13 Jun 2006
  • Date First Published: 13 Jun 2006
  • Date Last Updated: 14 Jun 2006
  • Severity Metric: 20.31
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.