Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/10611 - | |
References | () http://www.cert.org/advisories/CA-2004-01.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/749342 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/9406 - | |
References | () http://www.securityfocus.com/bid/9408 - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id?1008698 - | |
References | () http://www.uniras.gov.uk/vuls/2004/006489/h323.htm - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-001 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A478 - |
Information
Published : 2004-02-17 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0819
Mitre link : CVE-2003-0819
CVE.ORG link : CVE-2003-0819
JSON object : View
Products Affected
microsoft
- proxy_server
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer