Vulnerabilities > CVE-2003-0525 - Unspecified vulnerability in Microsoft Windows NT 4.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 23 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS03-029.NASL |
description | The remote host is running a version of Windows NT 4.0 that has a flaw in one of its functions that could allow a user to cause a denial of service on this host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11802 |
published | 2003-07-23 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11802 |
title | MS03-029: Flaw in Windows Function may allow DoS (823803) |
code |
|
Oval
accepted | 2008-03-24T04:00:28.143-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method. | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:319 | ||||||||
status | accepted | ||||||||
submitted | 2003-10-10T12:00:00.000-04:00 | ||||||||
title | Windows NT getCanonicalPath Heap Corruption Denial of Service | ||||||||
version | 71 |