Vulnerabilities > CVE-2003-0806 - Unspecified vulnerability in Microsoft Windows 2000, Windows NT and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-011.NASL |
description | The remote host is missing a critical Microsoft Windows Security Update (835732). This update fixes various flaws that could allow an attacker to execute arbitrary code on the remote host. A series of worms (Sasser) are known to exploit this vulnerability in the wild. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12205 |
published | 2004-04-13 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12205 |
title | MS04-011: Microsoft Hotfix (credentialed check) (835732) |
code |
|
Oval
accepted 2011-05-16T04:00:13.592-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code. family windows id oval:org.mitre.oval:def:1054 status accepted submitted 2004-04-13T12:00:00.000-04:00 title Windows XP winlogon Remote Buffer Overflow version 71 accepted 2008-03-24T04:00:52.475-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code. family windows id oval:org.mitre.oval:def:895 status accepted submitted 2004-04-13T12:00:00.000-04:00 title Windows NT winlogon Remote Buffer Overflow version 71 accepted 2006-10-10T20:40:01.140-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name John Hoyland organization Centennial Software name Matthew Wojcik organization The MITRE Corporation
definition_extensions comment Microsoft Windows 2000 is installed oval oval:org.mitre.oval:def:85 description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code. family windows id oval:org.mitre.oval:def:896 status accepted submitted 2004-04-13T12:00:00.000-04:00 title Windows 2000 winlogon Remote Buffer Overflow version 72
References
- http://www.ciac.org/ciac/bulletins/o-114.shtml
- http://www.ciac.org/ciac/bulletins/o-114.shtml
- http://www.kb.cert.org/vuls/id/471260
- http://www.kb.cert.org/vuls/id/471260
- http://www.securityfocus.com/bid/10126
- http://www.securityfocus.com/bid/10126
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15702
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15702
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A895
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A895
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A896
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A896