CVE-2004-0572

Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/543864 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10677 Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037
https://exchange.xforce.ibmcloud.com/vulnerabilities/16664
https://exchange.xforce.ibmcloud.com/vulnerabilities/17662
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/543864 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10677 Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037
https://exchange.xforce.ibmcloud.com/vulnerabilities/16664
https://exchange.xforce.ibmcloud.com/vulnerabilities/17662
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:grpconv:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html - Exploit, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/543864 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/543864 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/10677 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/10677 - Patch, Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16664 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16664 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17662 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17662 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493 -

Information

Published : 2004-11-03 05:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0572

Mitre link : CVE-2004-0572

CVE.ORG link : CVE-2004-0572


JSON object : View

Products Affected

microsoft

  • grpconv