Vulnerabilities > CVE-2004-0574 - Out-Of-Bounds Write vulnerability in Microsoft products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 3 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | MS Windows NNTP Service (XPAT) Denial of Service Exploit (MS04-036). CVE-2004-0574. Dos exploit for windows platform |
id | EDB-ID:578 |
last seen | 2016-01-31 |
modified | 2004-10-16 |
published | 2004-10-16 |
reporter | Lucas Lavarello |
source | https://www.exploit-db.com/download/578/ |
title | Microsoft Windows NNTP Service XPAT Denial of Service Exploit MS04-036 |
Nessus
NASL family | Windows |
NASL id | MSNNTP_CODE_EXECUTION.NASL |
description | The remote host is running a version of Microsoft NNTP server that is vulnerable to a buffer overflow issue. An attacker may exploit this flaw to execute arbitrary commands on the remote host with the privileges of the NNTP server process. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15465 |
published | 2004-10-12 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15465 |
title | MS04-036: Microsoft NNTP Component Remote Overflow (883935) (uncredentialed check) |
code |
|
Oval
accepted 2007-11-13T12:01:09.183-05:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc. name Jeff Cheng organization Opsware, Inc.
description The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. family windows id oval:org.mitre.oval:def:246 status accepted submitted 2004-10-26T09:17:00.000-04:00 title Network News Transfer Protocol Buffer Overflow version 30 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc. name Maria Mikhno organization ALTX-SOFT
description The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. family windows id oval:org.mitre.oval:def:4392 status accepted submitted 2004-10-14T08:47:00.000-04:00 title Windows Server 2003 NNTP Component Buffer Overflow version 29 accepted 2007-11-13T12:01:18.060-05:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name John Hoyland organization Centennial Software name Jeff Cheng organization Opsware, Inc.
description The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. family windows id oval:org.mitre.oval:def:5021 status accepted submitted 2004-10-13T12:21:00.000-04:00 title Vulnerability in NNTP Could Allow Remote Code Execution version 31 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. family windows id oval:org.mitre.oval:def:5070 status accepted submitted 2004-10-14T01:15:00.000-04:00 title Windows NT NNTP Component Buffer Overflow version 39 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name John Hoyland organization Centennial Software name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. family windows id oval:org.mitre.oval:def:5926 status accepted submitted 2004-10-14T08:58:00.000-04:00 title Windows 2000 NNTP Component Buffer Overflow version 34
References
- http://marc.info/?l=bugtraq&m=109761632831563&w=2
- http://www.ciac.org/ciac/bulletins/p-012.shtml
- http://www.coresecurity.com/common/showdoc.php?idx=420&idxseccion=10
- http://www.kb.cert.org/vuls/id/203126
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17641
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17661
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A246
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4392
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5070
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5926