Vulnerabilities > CVE-2004-0572 - Local Buffer Overrun vulnerability in Microsoft Windows Program Group Converter Filename
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-037.NASL |
description | The remote version of Windows contains a flaw in the Windows Shell that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to lure a victim into visiting a malicious website or into opening a malicious file attachment. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15460 |
published | 2004-10-12 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15460 |
title | MS04-037: Vulnerability in Windows Shell (841356) |
code |
|
Oval
accepted 2004-12-09T08:46:00.000-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:1279 status accepted submitted 2004-10-14T03:38:00.000-04:00 title Windows 98 Program Group Converter Buffer Overflow version 2 accepted 2011-05-16T04:01:55.499-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:1837 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows XP (64-Bit) Program Group Converter Buffer Overflow in grpconv.exe version 73 accepted 2011-05-16T04:01:56.952-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:1843 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows XP (32-Bit) Program Group Converter Buffer Overflow version 70 accepted 2004-12-09T08:46:00.000-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:2753 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows 2000 Program Group Converter Buffer Overflow version 64 accepted 2008-03-24T04:00:26.547-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name John Hoyland organization Centennial Software name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:3071 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows NT Program Group Converter Buffer Overflow version 72 accepted 2004-12-09T08:46:00.000-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:3768 status accepted submitted 2004-10-14T03:38:00.000-04:00 title Windows ME Program Group Converter Buffer Overflow version 2 accepted 2011-05-16T04:02:53.715-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:3822 status accepted submitted 2004-10-14T03:38:00.000-04:00 title Windows XP (64-Bit) Program Group Converter Buffer Overflow in shell32.dll version 72 accepted 2004-12-09T08:46:00.000-04:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:4244 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows 2003 (32-Bit) Program Group Converter Buffer Overflow version 64 accepted 2009-12-21T04:00:31.880-05:00 class vulnerability contributors name Andrew Buttner organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Dragos Prisaca organization Gideon Technologies, Inc.
description Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe. family windows id oval:org.mitre.oval:def:4493 status accepted submitted 2004-10-14T03:39:00.000-04:00 title Windows 2003 (64-Bit) Program Group Converter Buffer Overflow version 68
References
- http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html
- http://www.kb.cert.org/vuls/id/543864
- http://www.securityfocus.com/bid/10677
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16664
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17662
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493