{"api_version":"1","generated_at":"2026-04-23T06:19:03+00:00","cve":"CVE-2006-0306","urls":{"html":"https://cve.report/CVE-2006-0306","api":"https://cve.report/api/cve/CVE-2006-0306.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-0306","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-0306"},"summary":{"title":"CVE-2006-0306","description":"The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-01-19 00:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-399","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.designfolks.com.au/karma/DMPrimer/","name":"http://www.designfolks.com.au/karma/DMPrimer/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory","URL Repurposed"],"title":"Error handling weakness in DM Primer Service","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015504","name":"http://securitytracker.com/id?1015504","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - DM Deployment Common Component (DMPrimer) Lets Remote Users Deny Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18531","name":"http://secunia.com/advisories/18531","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - CA DM Deployment Common Component Denial of Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/16276","name":"http://www.securityfocus.com/bid/16276","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Computer Associates Unicenter Remote Control DM Primer Remote Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp","name":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SupportConnect - DM Deployment Common Component Security Notice","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/422381/100/0/threaded","name":"http://www.securityfocus.com/archive/1/422381/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/22529","name":"http://www.osvdb.org/22529","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756","name":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"CA DM Deployment Common Component DM Primer vulnerabilities","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/0236","name":"http://www.vupen.com/english/advisories/2006/0236","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-0306","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0306","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_arcserve_backup_laptops_desktops","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_arcserve_backup_laptops_desktops","cpe6":"11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_arcserve_backup_laptops_desktops","cpe6":"11.1","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_mobile_backup","cpe6":"r4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"business_protection_suite","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"desktop_protection_suite","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"server_protection_suite","cpe6":"2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"unicenter_remote_control","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"unicenter_remote_control","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"unicenter_remote_control","cpe6":"6.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0","cpe7":"sp1","cpe8":"*","cpe9":"en","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0","cpe7":"sp1","cpe8":"*","cpe9":"fr","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0_build_6.0.56.3","cpe7":"*","cpe8":"*","cpe9":"en","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0_build_6.0.74","cpe7":"*","cpe8":"*","cpe9":"de","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0_build_6.0.74","cpe7":"*","cpe8":"*","cpe9":"en","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"306","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"unicenter_remote_control","cpe6":"6.0_build_6.0.74","cpe7":"*","cpe8":"*","cpe9":"fr","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"306","cve":"CVE-2006-0306","epss":"0.156240000","percentile":"0.947090000","score_date":"2026-04-16","updated_at":"2026-04-17 00:09:25"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T16:34:13.228Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"22529","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/22529"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.designfolks.com.au/karma/DMPrimer/"},{"name":"20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/422381/100/0/threaded"},{"name":"ADV-2006-0236","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0236"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756"},{"name":"18531","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18531"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp"},{"name":"16276","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/16276"},{"name":"1015504","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015504"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-01-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"22529","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/22529"},{"tags":["x_refsource_MISC"],"url":"http://www.designfolks.com.au/karma/DMPrimer/"},{"name":"20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/422381/100/0/threaded"},{"name":"ADV-2006-0236","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0236"},{"tags":["x_refsource_CONFIRM"],"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756"},{"name":"18531","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18531"},{"tags":["x_refsource_CONFIRM"],"url":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp"},{"name":"16276","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/16276"},{"name":"1015504","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015504"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-0306","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"22529","refsource":"OSVDB","url":"http://www.osvdb.org/22529"},{"name":"http://www.designfolks.com.au/karma/DMPrimer/","refsource":"MISC","url":"http://www.designfolks.com.au/karma/DMPrimer/"},{"name":"20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/422381/100/0/threaded"},{"name":"ADV-2006-0236","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/0236"},{"name":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756","refsource":"CONFIRM","url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756"},{"name":"18531","refsource":"SECUNIA","url":"http://secunia.com/advisories/18531"},{"name":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp","refsource":"CONFIRM","url":"http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp"},{"name":"16276","refsource":"BID","url":"http://www.securityfocus.com/bid/16276"},{"name":"1015504","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015504"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-0306","datePublished":"2006-01-19T00:00:00.000Z","dateReserved":"2006-01-18T00:00:00.000Z","dateUpdated":"2024-08-07T16:34:13.228Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-01-19 00:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-399","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*","matchCriteriaId":"4FB993B2-9A44-40E2-AA05-0CAD04BDC26D"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*","matchCriteriaId":"C7461AE5-2067-4964-93B7-560CD02CEAC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*","matchCriteriaId":"9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_mobile_backup:r4.0:*:*:*:*:*:*:*","matchCriteriaId":"D9448EC1-7527-4CF9-85FC-26F61714E4B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*","matchCriteriaId":"328E1C42-488A-43FC-8DF2-758DC73B74AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DB698F99-FC87-4D59-9E01-3CE7A57FE0E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*","matchCriteriaId":"A8781759-7B4C-47C3-8A60-8CA5520360C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:unicenter_remote_control:5.2:*:*:*:*:*:*:*","matchCriteriaId":"B43CE892-50CB-429F-B986-6FD4398A1D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*","matchCriteriaId":"53C2C33D-8403-4C75-8A52-713393FE408F"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*","matchCriteriaId":"D293FB82-D21B-4BDD-A511-B994B557032A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:en:*:*:*:*","matchCriteriaId":"63788A55-F137-4F8A-8FDD-9C0B9881DE1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:fr:*:*:*:*","matchCriteriaId":"D9AB86C1-ABE7-4DB1-A050-2E54607BF3C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.56.3:*:*:en:*:*:*:*","matchCriteriaId":"8E01F0FB-C836-4B25-9B40-6D0EEDEDFA74"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:de:*:*:*:*","matchCriteriaId":"C45E9E3A-68D4-46D3-8A56-A07A76F4F7FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:en:*:*:*:*","matchCriteriaId":"1B36DAA2-B8F5-43A6-B407-5FF718383D4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:fr:*:*:*:*","matchCriteriaId":"C7F41317-348B-4DD7-917C-46C6E2857E50"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"306","Ordinal":"1","Title":"CVE-2006-0306","CVE":"CVE-2006-0306","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"306","Ordinal":"1","NoteData":"The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit.","Type":"Description","Title":"CVE-2006-0306"},{"CveYear":"2006","CveId":"306","Ordinal":"2","NoteData":"2006-01-18","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"306","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}