This module exploits a remote vulnerability that could allow an attacker to send a specially crafted SMB message to an affected system causing a denial of service. This bug was accidentally discovered while researching the details for the vulnerability MS06-035. This is a different vulnerability, and does not give the attacker the possibility of code execution.
This module exploits an assertion failure vulnerability in BIND 9.8.0 servers to cause a denial of service. This vulnerability only affects BIND users who are using the Response Policy Zones (RPZ) feature configured for RRset replacement, i.e., returning a positive answer defined by the response policy.
This module exploits a vulnerability in BIND 9 when parsing dynamic update messages containing a record of type "ANY" and where at least one RRset for this FQDN exists on the server, causing the service to exit.
This module exploits a denial of service vulnerability that results because IIS 5.0 and 5.1 do not correctly handle an error condition when an overly long WebDAV request is passed to them.
This module restarts the IIS server. This exploit forces the IIS process inetinfo.exe to throw an unhandled exception. IIS' behavior depends on the operating system version, its configuration and the system-wide debugger specified in the registry. By default under Windows 2000 Advanced Server the target host will automatically restart. Under Windows 2000 Professional a message box will pop up in the console and the server will not be restarted until a user presses [OK].