Vulnerabilities > CVE-2004-0119 - NULL Pointer Dereference vulnerability in Microsoft Windows 2000, Windows Server 2003 and Windows XP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-011.NASL |
description | The remote host is missing a critical Microsoft Windows Security Update (835732). This update fixes various flaws that could allow an attacker to execute arbitrary code on the remote host. A series of worms (Sasser) are known to exploit this vulnerability in the wild. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12205 |
published | 2004-04-13 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12205 |
title | MS04-011: Microsoft Hotfix (credentialed check) (835732) |
code |
|
Oval
accepted 2007-05-23T15:05:32.274-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Glenn Strickland organization Secure Elements, Inc.
description The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. family windows id oval:org.mitre.oval:def:1808 status accepted submitted 2004-06-14T12:00:00.000-04:00 title Windows 2000 Negotiate Security Software Provider Denial of Service Vulnerability version 66 accepted 2007-05-23T15:05:35.128-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Glenn Strickland organization Secure Elements, Inc.
description The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. family windows id oval:org.mitre.oval:def:1962 status accepted submitted 2004-06-15T12:00:00.000-04:00 title Windows Server 2003 Negotiate Security Software Provider Denial of Service Vulnerability version 67 accepted 2011-05-16T04:02:15.814-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Anna Min organization BigFix, Inc name Glenn Strickland organization Secure Elements, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. family windows id oval:org.mitre.oval:def:1997 status accepted submitted 2004-06-15T12:00:00.000-04:00 title Windows XP Negotiate Security Software Provider Denial of Service Vulnerability version 73
References
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0081.html
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0081.html
- http://www.ciac.org/ciac/bulletins/o-114.shtml
- http://www.ciac.org/ciac/bulletins/o-114.shtml
- http://www.kb.cert.org/vuls/id/638548
- http://www.kb.cert.org/vuls/id/638548
- http://www.securityfocus.com/bid/10113
- http://www.securityfocus.com/bid/10113
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15715
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15715
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1962
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1962
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1997
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1997