Vulnerabilities > CVE-2004-0212
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Hardware | 2 | |
OS | 1 | |
OS | 13 |
Exploit-Db
description MS Windows 2K/XP Task Scheduler .job Exploit (MS04-022). CVE-2004-0212. Local exploit for windows platform id EDB-ID:353 last seen 2016-01-31 modified 2004-07-18 published 2004-07-18 reporter N/A source https://www.exploit-db.com/download/353/ title Microsoft Windows 2000/XP - Task Scheduler .job Exploit MS04-022 description MS Windows XP Task Scheduler (.job) Universal Exploit (MS04-022). CVE-2004-0212. Local exploit for windows platform id EDB-ID:368 last seen 2016-01-31 modified 2004-07-31 published 2004-07-31 reporter houseofdabus source https://www.exploit-db.com/download/368/ title Microsoft Windows XP Task Scheduler .job Universal Exploit MS04-022
Nessus
NASL family Windows NASL id TASK_SCHEDULER_TEST.NASL description There is a flaw in the Task Scheduler application which could allow a remote attacker to execute code remotely. There are many attack vectors for this flaw. An attacker, exploiting this flaw, would need to either have the ability to connect to the target machine or be able to coerce a local user to either install a .job file or browse to a malicious website. last seen 2020-06-01 modified 2020-06-02 plugin id 13852 published 2004-07-29 reporter This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13852 title MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873) (uncredentialed check) NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS04-022.NASL description The remote host is running a version of Windows which contains a flaw in the task scheduler that could lead to arbitrary execution of commands on the remote host. To exploit this vulnerability, an attacker would need to lure a user on the remote host to take certain steps to execute a .job file, or to visit a rogue website, arbitrary commands could then be used on the remote host. last seen 2020-06-01 modified 2020-06-02 plugin id 13640 published 2004-07-13 reporter This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13640 title MS04-022: Task Scheduler Vulnerability (841873)
Oval
accepted 2014-02-24T04:00:15.437-05:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. family windows id oval:org.mitre.oval:def:1344 status accepted submitted 2004-07-14T04:00:00.000-04:00 title Windows NT Task Scheduler Stack Overflow version 79 accepted 2011-05-16T04:01:49.373-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Jeff Ito organization Secure Elements, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. family windows id oval:org.mitre.oval:def:1781 status accepted submitted 2004-07-14T12:00:00.000-04:00 title Windows XP (64-Bit) Task Scheduler Stack Overflow version 72 accepted 2011-05-16T04:02:11.261-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Tiffany Bergeron organization The MITRE Corporation name Anna Min organization BigFix, Inc name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. family windows id oval:org.mitre.oval:def:1964 status accepted submitted 2004-07-13T12:00:00.000-04:00 title Windows XP (32-Bit) Task Scheduler Stack Overflow version 69 accepted 2004-08-25T12:00:00.000-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation description Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. family windows id oval:org.mitre.oval:def:3428 status accepted submitted 2004-07-14T12:00:00.000-04:00 title Windows 2000 Task Scheduler Stack Overflow version 64
Saint
bid | 10708 |
description | Windows Task Scheduler buffer overflow |
id | win_patch_taskbo |
osvdb | 7798 |
title | windows_task_scheduler |
type | client |
References
- http://marc.info/?l=bugtraq&m=108981273009250&w=2
- http://marc.info/?l=bugtraq&m=108981403025596&w=2
- http://secunia.com/advisories/12060
- http://www.kb.cert.org/vuls/id/228028
- http://www.ngssoftware.com/advisories/mstaskjob.txt
- http://www.us-cert.gov/cas/techalerts/TA04-196A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16591
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1344
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1781
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1964
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3428