Vulnerabilities > Microsoft > Windows 2003 Server > datacenter.64.bit

DATE CVE VULNERABILITY TITLE RISK
2005-06-14 CVE-2005-1212 Buffer Overflow vulnerability in Microsoft Step-By-Step Interactive Training Bookmark Link
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
network
low complexity
microsoft
7.5
2005-06-14 CVE-2005-1208 Remote Code Execution vulnerability in Microsoft Windows HTML Help
Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
network
low complexity
microsoft
critical
10.0
2005-05-18 CVE-2005-1649 Denial of Service vulnerability in Microsoft Windows 2003 Server and Windows XP
The IPv6 support in Windows XP SP2, 2003 Server SP1, and Longhorn, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, a variant of CVE-2005-0688 and a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
network
low complexity
microsoft
5.0
2005-05-02 CVE-2005-1184 Denial Of Service vulnerability in Multiple Vendor TCP Session Acknowledgement Number
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets.
network
low complexity
microsoft
5.0
2005-01-10 CVE-2004-0894 Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.
local
low complexity
microsoft
7.2
2005-01-10 CVE-2004-0893 Unspecified vulnerability in Microsoft products
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
local
low complexity
microsoft
7.2
2005-01-10 CVE-2004-0568 Unspecified vulnerability in Microsoft products
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
network
low complexity
microsoft
critical
10.0
2004-12-31 CVE-2004-1306 Heap Overflow vulnerability in Microsoft Windows winhlp32 Phrase
Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.
network
high complexity
microsoft
5.1