Executive Summary

Informations
Name MS04-022 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability in Task Scheduler Could Allow Code Execution (841873)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1344
 
Oval ID: oval:org.mitre.oval:def:1344
Title: Windows NT Task Scheduler Stack Overflow
Description: Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0212
Version: 10
Platform(s): Microsoft Windows NT
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1781
 
Oval ID: oval:org.mitre.oval:def:1781
Title: Windows XP (64-Bit) Task Scheduler Stack Overflow
Description: Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0212
Version: 8
Platform(s): Microsoft Windows XP
Product(s): Task Scheduler
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1964
 
Oval ID: oval:org.mitre.oval:def:1964
Title: Windows XP (32-Bit) Task Scheduler Stack Overflow
Description: Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0212
Version: 5
Platform(s): Microsoft Windows XP
Product(s): Task Scheduler
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:3428
 
Oval ID: oval:org.mitre.oval:def:3428
Title: Windows 2000 Task Scheduler Stack Overflow
Description: Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0212
Version: 1
Platform(s): Microsoft Windows 2000
Product(s): Task Scheduler
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Hardware 1
Hardware 1
Os 1
Os 5
Os 3
Os 5

SAINT Exploits

Description Link
Windows Task Scheduler buffer overflow More info here

ExploitDB Exploits

id Description
2004-07-31 MS Windows XP Task Scheduler (.job) Universal Exploit (MS04-022)
2004-07-18 MS Windows 2K/XP Task Scheduler .job Exploit (MS04-022)

Open Source Vulnerability Database (OSVDB)

Id Description
7798 Microsoft Windows Task Scheduler Remote Overflow

A remote overflow exists in Microsoft Windows. The Task Scheduler application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted *.job file, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows Task Scheduler buffer overflow attempt
RuleID : 23489 - Revision : 4 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2004-07-29 Name : Arbitrary code can be executed on the remote host.
File : task_scheduler_test.nasl - Type : ACT_GATHER_INFO
2004-07-13 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms04-022.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:45:01
  • Multiple Updates