Vulnerabilities > Microsoft > Windows 2000 > High

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0045 Remote Buffer Overflow vulnerability in Microsoft Windows Server Message Block Handlers
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.
network
low complexity
microsoft
7.5
2005-05-02 CVE-2005-0044 Unspecified vulnerability in Microsoft products
The OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."
network
low complexity
microsoft
7.5
2005-04-27 CVE-2005-0416 Buffer Overflow vulnerability in Microsoft Windows User32.DLL ANI File Header Handling Stack-Based
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote attackers to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based buffer overflow.
network
low complexity
microsoft
7.5
2005-01-10 CVE-2004-0894 Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.
local
low complexity
microsoft
7.2
2005-01-10 CVE-2004-0893 Unspecified vulnerability in Microsoft products
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
local
low complexity
microsoft
7.2
2004-12-31 CVE-2004-0567 Remote Buffer Overflow vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
network
low complexity
microsoft
7.5
2004-11-03 CVE-2004-0208 Unspecified vulnerability in Microsoft products
The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.
local
low complexity
microsoft
7.2
2004-11-03 CVE-2004-0206 Remote Buffer Overflow vulnerability in Microsoft Windows NetDDE
Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.
network
low complexity
microsoft
7.5
2004-08-31 CVE-2004-1649 Local Security vulnerability in Windows 2000 Server
Buffer overflow in Microsoft Msinfo32.exe might allow local users to execute arbitrary code via a long filename in the msinfo_file command line parameter.
local
low complexity
microsoft
7.2
2004-08-06 CVE-2004-0213 Missing Authentication for Critical Function vulnerability in Microsoft Windows 2000
Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.
local
low complexity
microsoft CWE-306
7.8