This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Name cpe:/o:microsoft:windows_nt:4.0:sp6a:terminal_server
Detail
Vendor Microsoft First view 2002-07-03
Product Windows Nt Last view 2008-10-20
Version 4.0 Type Os
Edition terminal_server  
Language  
Update sp6a  
 
CPE Product cpe:/o:microsoft:windows_nt

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
7.1 2008-10-20 CVE-2008-4609 Network Medium None Requ...
9.3 2006-06-13 CVE-2006-2379 Network Medium None Requ...
5 2006-05-09 CVE-2006-1184 Network Low None Requ...
7.5 2006-05-09 CVE-2006-0034 Network Low None Requ...
5.1 2006-04-03 CVE-2006-1591 Network High None Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
9.3 2006-01-10 CVE-2006-0010 Network Medium None Requ...
5 2005-05-02 CVE-2005-1184 Network Low None Requ...
10 2005-05-02 CVE-2005-0050 Network Low None Requ...
7.5 2005-05-02 CVE-2005-0045 Network Low None Requ...
10 2005-01-10 CVE-2004-1080 Network Low None Requ...
5.1 2004-12-31 CVE-2004-1306 Network High None Requ...
5 2004-12-23 CVE-2004-1361 Network Low None Requ...
5 2003-10-20 CVE-2003-0661 Network Low None Requ...
10 2003-09-17 CVE-2003-0715 Network Low None Requ...
10 2003-09-17 CVE-2003-0528 Network Low None Requ...
7.5 2003-08-18 CVE-2003-0352 Network Low None Requ...
7.5 2003-08-18 CVE-2003-0345 Network Low None Requ...
4.6 2003-05-12 CVE-2003-0112 Local Low None Requ...
5 2003-04-02 CVE-2002-1561 Network Low None Requ...
7.5 2003-03-24 CVE-2003-0010 Network Low None Requ...
7.5 2003-02-07 CVE-2003-0003 Network Low None Requ...
5 2002-12-23 CVE-2002-1325 Network Low None Requ...
7.5 2002-12-23 CVE-2002-1260 Network Low None Requ...
5 2002-12-23 CVE-2002-1258 Network Low None Requ...

CWE : Common Weakness Enumeration

%idName
60% (3)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
20% (1)CWE-20Improper Input Validation
20% (1)CWE-16Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-47Buffer Overflow via Parameter Expansion

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:63Windows 2000 Remote Access Service Phonebook Buffer Overflow
oval:org.mitre.oval:def:61Windows NT Remote Access Service Phonebook Buffer Overflow
oval:org.mitre.oval:def:374HTML Help ActiveX Control Buffer Overflow
oval:org.mitre.oval:def:403Code Execution via Compiled HTML Help File
oval:org.mitre.oval:def:189Network Share Provider Buffer Overflow
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:2671Windows 2000 Certificate Validation Identity Spoofing Vulnerability (Test 2)
oval:org.mitre.oval:def:1332Windows 2000 Certificate Validation Identity Spoofing Vulnerability (Test 1)
oval:org.mitre.oval:def:1056Microsoft Certificate Validation Flaw Identity Spoofing Vulnerability
oval:org.mitre.oval:def:199Weak Encryption in RDP Protocol
oval:org.mitre.oval:def:582MSJava Applet CODEBASE File Access Vulnerability
oval:org.mitre.oval:def:59Microsoft Windows RPC Denial of Service
oval:org.mitre.oval:def:103Windows RPC Locator Service Buffer Overflow
oval:org.mitre.oval:def:795DEPRECATED: Windows Script Engine Heap Overflow (Test 3)
oval:org.mitre.oval:def:794DEPRECATED: Windows Script Engine Heap Overflow (Test 2)
oval:org.mitre.oval:def:200DEPRECATED: Windows Script Engine Heap Overflow (Test 1)
oval:org.mitre.oval:def:134Windows Script Engine Heap Overflow (Test 4)
oval:org.mitre.oval:def:779Windows XP Kernel Debugger-based Buffer Overflow (Test 2)
oval:org.mitre.oval:def:3145Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:262Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2265Windows NT Terminal Server Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2022Windows NT Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:142Suppressed OVAL142, covered by OVAL2022
oval:org.mitre.oval:def:1264Windows XP Kernel Debugger-based Buffer Overflow (Test 1)
oval:org.mitre.oval:def:3391Windows XP SMB Buffer Overflow
oval:org.mitre.oval:def:146Windows NT SMB Buffer Overflow

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
62144F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St...
61133Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC...
59482Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation...
58614McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio...
58321Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati...
Hide | Show 20 More...
idDescription
58189Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC...
57993Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem...
57795Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State...
57794Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl...
57793Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta...
50286Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot...
26433Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
25336Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Req...
25335Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServ...
24802Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
18829Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
16610Multiple Vendor TCP Implementation Malformed Ack Number "Keep Alive"...
14475Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
13600Microsoft Windows SMB Transaction Data Overflow
13599Microsoft Windows License Logging Service Overflow
13418Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
13417Microsoft Virtual Machine COM Object Arbitrary Code Execution
13414Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
13412Microsoft Virtual Machine user.dir Property Information Disclosure
12625Microsoft Windows winhlp32.exe Overflow

ExploitDB Exploits

idDescription
21746MS Windows 2000/NT 4/XP Network Share Provider SMB Request Buffer Overflow (1)
1065MS Windows (SMB) Transaction Response Handling Exploit (MS05-011)

Metasploit Exploits

idDescription
2004-12-14MS04-045 Microsoft WINS Service Memory Overwrite
2003-07-16MS03-026 Microsoft RPC DCOM Interface Overflow

OpenVAS Exploits

idDescription
2009-11-16Name : Microsoft RPC Interface Buffer Overrun (KB824146)
File : nvt/msrpc_dcom2.nasl
2009-09-10Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-03-16Name : Microsoft MS03-034 security check
File : nvt/remote-MS03-034.nasl
2005-11-03Name : Certificate Validation Flaw Could Enable Identity Spoofing (Q328145)
File : nvt/smb_nt_ms02-050.nasl
2005-11-03Name : Microsoft RDP flaws could allow sniffing and DOS(Q324380)
File : nvt/smb_nt_ms02-051.nasl
Hide | Show 5 More...
idDescription
2005-11-03Name : Flaw in Microsoft VM Could Allow Code Execution (810030)
File : nvt/smb_nt_ms02-052.nasl
2005-11-03Name : Unchecked Buffer in Windows Help(Q323255)
File : nvt/smb_nt_ms02-055.nasl
2005-11-03Name : Buffer Overflow in Windows Troubleshooter ActiveX Control (826232)
File : nvt/smb_nt_ms03-042.nasl
2005-11-03Name : MS RPC Services null pointer reference DoS
File : nvt/msrpc-spike27.nasl
2005-11-03Name : Microsoft RPC Interface Buffer Overrun (823980)
File : nvt/msrpc_dcom.nasl

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9759 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9758 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9757 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9756 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object...
RuleID : 9755 - Type : NETBIOS - Revision : 7
Hide | Show 20 More...
DateDescription
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9754 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9753 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal...
RuleID : 9752 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9751 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9750 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9749 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9748 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9747 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9746 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9745 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9744 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att...
RuleID : 9743 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9742 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9741 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9740 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9739 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9738 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9737 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9736 - Type : NETBIOS - Revision : 5
2014-01-10SMB ISystemActivator CoGetInstanceFromFile WriteAndX unicode andx object call...
RuleID : 9735 - Type : NETBIOS - Revision : 7

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2010-09-01Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO
2009-09-08Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d...
File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO
2006-06-13Name : It is possible to execute code on the remote host.
File : smb_nt_ms06-032.nasl - Type : ACT_GATHER_INFO
2006-05-10Name : A vulnerability in MSDTC could allow remote code execution.
File : smb_kb913580.nasl - Type : ACT_GATHER_INFO
2006-05-09Name : It is possible to crash the remote MSDTC service.
File : smb_nt_ms06-018.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2006-01-10Name : Arbitrary code can be executed on the remote host by sending a malformed file...
File : smb_nt_ms06-002.nasl - Type : ACT_GATHER_INFO
2005-02-08Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms05-010.nasl - Type : ACT_GATHER_INFO
2005-02-08Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms05-011.nasl - Type : ACT_GATHER_INFO
2005-02-03Name : Random portions of memory may be disclosed thru the NetBIOS name service.
File : smb_nt_ms03-034.nasl - Type : ACT_GATHER_INFO
2004-12-15Name : Arbitrary code can be executed on the remote host.
File : wins_replication_overflow.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host via the WINS service.
File : smb_nt_ms04-045.nasl - Type : ACT_GATHER_INFO
2003-09-17Name : The remote host has evidence of being compromised by a widely known exploit.
File : smb_login_as_e.nasl - Type : ACT_GATHER_INFO
2003-09-10Name : Arbitrary code can be executed on the remote host.
File : msrpc_dcom2.nasl - Type : ACT_GATHER_INFO
2003-09-04Name : The remote service is affected by an information disclosure vulnerability.
File : netbios_mem_disclosure.nasl - Type : ACT_GATHER_INFO
2003-07-28Name : Arbitrary code can be executed on the remote host.
File : msrpc_dcom.nasl - Type : ACT_ATTACK
2003-07-17Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms03-026.nasl - Type : ACT_GATHER_INFO
2003-07-10Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms03-024.nasl - Type : ACT_GATHER_INFO
2003-04-16Name : A local user can elevate his privileges.
File : smb_nt_ms03-013.nasl - Type : ACT_GATHER_INFO
2003-03-26Name : It is possible to disable the remote RPC service.
File : smb_nt_ms03-010.nasl - Type : ACT_GATHER_INFO
2003-03-20Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms03-008.nasl - Type : ACT_GATHER_INFO
2003-03-01Name : It is possible to crash the remote host.
File : smb_nt_ms02-045.nasl - Type : ACT_GATHER_INFO
2003-01-23Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms03-001.nasl - Type : ACT_GATHER_INFO
2002-11-28Name : Arbitrary code can be executed on the remote host through the VM.
File : smb_nt_ms02-052.nasl - Type : ACT_GATHER_INFO
2002-11-21Name : The remote Windows host is affected by a denial of service vulnerability.
File : msrpc-spike27.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2002-10-24Name : It is possible to spoof user identities.
File : smb_nt_ms02-050.nasl - Type : ACT_GATHER_INFO