CVE-2004-0206

Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.
References
Link Resource
http://marc.info/?l=bugtraq&m=109786703930674&w=2
http://secunia.com/advisories/12803/
http://www.kb.cert.org/vuls/id/640488 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/11372
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031
https://exchange.xforce.ibmcloud.com/vulnerabilities/16556
https://exchange.xforce.ibmcloud.com/vulnerabilities/17657
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1852
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2394
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3120
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4592
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5074
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6788
http://marc.info/?l=bugtraq&m=109786703930674&w=2
http://secunia.com/advisories/12803/
http://www.kb.cert.org/vuls/id/640488 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/11372
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031
https://exchange.xforce.ibmcloud.com/vulnerabilities/16556
https://exchange.xforce.ibmcloud.com/vulnerabilities/17657
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1852
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2394
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3120
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4592
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5074
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6788
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109786703930674&w=2 - () http://marc.info/?l=bugtraq&m=109786703930674&w=2 -
References () http://secunia.com/advisories/12803/ - () http://secunia.com/advisories/12803/ -
References () http://www.kb.cert.org/vuls/id/640488 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/640488 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/11372 - () http://www.securityfocus.com/bid/11372 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16556 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16556 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17657 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17657 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1852 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1852 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2394 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2394 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3120 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3120 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3242 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3242 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4592 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4592 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5074 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5074 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6788 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6788 -

Information

Published : 2004-11-03 05:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0206

Mitre link : CVE-2004-0206

CVE.ORG link : CVE-2004-0206


JSON object : View

Products Affected

microsoft

  • windows_98
  • windows_xp
  • windows_2000
  • windows_nt
  • windows_2003_server