A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98550 - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/98752 - Third Party Advisory, VDB Entry | |
References | () https://blog.0patch.com/2017/06/a-quick-analysis-of-microsofts.html - | |
References | () https://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit - Exploit, Third Party Advisory | |
References | () https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ - Patch, Vendor Advisory | |
References | () https://support.microsoft.com/en-us/help/4022747/security-update-for-windows-xp-and-windows-server-2003 - Patch, Vendor Advisory |
Information
Published : 2017-06-22 14:29
Updated : 2024-11-21 03:02
NVD link : CVE-2017-0176
Mitre link : CVE-2017-0176
CVE.ORG link : CVE-2017-0176
JSON object : View
Products Affected
microsoft
- windows_server_2003
- windows_xp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')