Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A607
https://exchange.xforce.ibmcloud.com/vulnerabilities/29948
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070
http://www.vupen.com/english/advisories/2006/4508
http://www.us-cert.gov/cas/techalerts/TA06-318A.html
http://www.securityfocus.com/bid/20985
http://www.securityfocus.com/archive/1/451588/100/0/threaded
http://www.kb.cert.org/vuls/id/778036
http://securitytracker.com/id?1017221
http://secunia.com/advisories/22883
http://research.eeye.com/html/advisories/published/AD20061114.html