Vulnerabilities > CVE-2004-0212

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
avaya
microsoft
critical
nessus
exploit available

Summary

Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.

Exploit-Db

  • descriptionMS Windows 2K/XP Task Scheduler .job Exploit (MS04-022). CVE-2004-0212. Local exploit for windows platform
    idEDB-ID:353
    last seen2016-01-31
    modified2004-07-18
    published2004-07-18
    reporterN/A
    sourcehttps://www.exploit-db.com/download/353/
    titleMicrosoft Windows 2000/XP - Task Scheduler .job Exploit MS04-022
  • descriptionMS Windows XP Task Scheduler (.job) Universal Exploit (MS04-022). CVE-2004-0212. Local exploit for windows platform
    idEDB-ID:368
    last seen2016-01-31
    modified2004-07-31
    published2004-07-31
    reporterhouseofdabus
    sourcehttps://www.exploit-db.com/download/368/
    titleMicrosoft Windows XP Task Scheduler .job Universal Exploit MS04-022

Nessus

  • NASL familyWindows
    NASL idTASK_SCHEDULER_TEST.NASL
    descriptionThere is a flaw in the Task Scheduler application which could allow a remote attacker to execute code remotely. There are many attack vectors for this flaw. An attacker, exploiting this flaw, would need to either have the ability to connect to the target machine or be able to coerce a local user to either install a .job file or browse to a malicious website.
    last seen2020-06-01
    modified2020-06-02
    plugin id13852
    published2004-07-29
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13852
    titleMS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873) (uncredentialed check)
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS04-022.NASL
    descriptionThe remote host is running a version of Windows which contains a flaw in the task scheduler that could lead to arbitrary execution of commands on the remote host. To exploit this vulnerability, an attacker would need to lure a user on the remote host to take certain steps to execute a .job file, or to visit a rogue website, arbitrary commands could then be used on the remote host.
    last seen2020-06-01
    modified2020-06-02
    plugin id13640
    published2004-07-13
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13640
    titleMS04-022: Task Scheduler Vulnerability (841873)

Oval

  • accepted2014-02-24T04:00:15.437-05:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
    familywindows
    idoval:org.mitre.oval:def:1344
    statusaccepted
    submitted2004-07-14T04:00:00.000-04:00
    titleWindows NT Task Scheduler Stack Overflow
    version79
  • accepted2011-05-16T04:01:49.373-04:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJeff Ito
      organizationSecure Elements, Inc.
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
    familywindows
    idoval:org.mitre.oval:def:1781
    statusaccepted
    submitted2004-07-14T12:00:00.000-04:00
    titleWindows XP (64-Bit) Task Scheduler Stack Overflow
    version72
  • accepted2011-05-16T04:02:11.261-04:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameAnna Min
      organizationBigFix, Inc
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
    familywindows
    idoval:org.mitre.oval:def:1964
    statusaccepted
    submitted2004-07-13T12:00:00.000-04:00
    titleWindows XP (32-Bit) Task Scheduler Stack Overflow
    version69
  • accepted2004-08-25T12:00:00.000-04:00
    classvulnerability
    contributors
    nameTiffany Bergeron
    organizationThe MITRE Corporation
    descriptionStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
    familywindows
    idoval:org.mitre.oval:def:3428
    statusaccepted
    submitted2004-07-14T12:00:00.000-04:00
    titleWindows 2000 Task Scheduler Stack Overflow
    version64

Saint

bid10708
descriptionWindows Task Scheduler buffer overflow
idwin_patch_taskbo
osvdb7798
titlewindows_task_scheduler
typeclient