The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/13466 - | |
References | () http://securitytracker.com/id?1012517 - | |
References | () http://www.ciac.org/ciac/bulletins/p-054.shtml - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/378160 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.osvdb.org/12370 - | |
References | () http://www.securityfocus.com/bid/11922 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18259 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0567
Mitre link : CVE-2004-0567
CVE.ORG link : CVE-2004-0567
JSON object : View
Products Affected
microsoft
- windows_2000
- windows_nt
- windows_2003_server
CWE