This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2000-04-14
Product Windows 2000 Last view 2010-06-08
Version * Type Os
Update sp4  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_2000

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.8 2010-06-08 CVE-2010-1255

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 allows local users to execute arbitrary code via vectors related to "glyph outline information" and TrueType fonts, aka "Win32k TrueType Font Parsing Vulnerability."

7.2 2010-06-08 CVE-2010-0819

Unspecified vulnerability in the Windows OpenType Compact Font Format (CFF) driver in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users to execute arbitrary code via unknown vectors related to improper validation when copying data from user mode to kernel mode, aka "OpenType CFF Font Driver Memory Corruption Vulnerability."

6.8 2010-06-08 CVE-2010-0485

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 "do not properly validate all callback parameters when creating a new window," which allows local users to execute arbitrary code, aka "Win32k Window Creation Vulnerability."

6.8 2010-06-08 CVE-2010-0484

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 "do not properly validate changes in certain kernel objects," which allows local users to execute arbitrary code via vectors related to Device Contexts (DC) and the GetDCEx function, aka "Win32k Improper Data Validation Vulnerability."

4.9 2010-05-06 CVE-2010-1735

The SfnLOGONNOTIFY function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x4c value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window.

4.9 2010-05-06 CVE-2010-1734

The SfnINSTRING function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x18d value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window.

9.3 2010-04-14 CVE-2010-0487

The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability."

9.3 2010-04-14 CVE-2010-0486

The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability."

9.3 2010-04-14 CVE-2010-0480

Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability."

9.3 2010-04-14 CVE-2010-0478

Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability."

10 2010-04-14 CVE-2010-0269

The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Memory Allocation Vulnerability."

9.3 2010-04-14 CVE-2010-0268

Unspecified vulnerability in the Windows Media Player ActiveX control in Windows Media Player (WMP) 9 on Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted media content, aka "Media Player Remote Code Execution Vulnerability."

4.9 2010-04-14 CVE-2010-0238

Unspecified vulnerability in registry-key validation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Registry Key Vulnerability."

6.9 2010-04-14 CVE-2010-0237

The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."

7.2 2010-04-14 CVE-2010-0236

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Allocation Vulnerability."

4.7 2010-04-14 CVE-2010-0235

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Symbolic Link Value Vulnerability."

4.7 2010-04-14 CVE-2010-0234

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Null Pointer Vulnerability."

9.3 2010-03-31 CVE-2010-0805

The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka "Memory Corruption Vulnerability."

4.3 2010-03-31 CVE-2010-0494

Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability."

9.3 2010-03-31 CVE-2010-0491

Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."

9.3 2010-03-31 CVE-2010-0489

Race condition in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Race Condition Memory Corruption Vulnerability."

4.3 2010-03-31 CVE-2010-0488

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 does not properly handle unspecified "encoding strings," which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site, aka "Post Encoding Information Disclosure Vulnerability."

9.3 2010-03-31 CVE-2010-0267

Microsoft Internet Explorer 6, 6 SP1, and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."

9.3 2010-03-10 CVE-2010-0806

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."

7.6 2010-03-03 CVE-2010-0917

Stack-based buffer overflow in VBScript in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, might allow user-assisted remote attackers to execute arbitrary code via a long string in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution when the F1 key is pressed, a different vulnerability than CVE-2010-0483.

CWE : Common Weakness Enumeration

%idName
23% (33) CWE-20 Improper Input Validation
19% (27) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
17% (25) CWE-94 Failure to Control Generation of Code ('Code Injection')
12% (17) CWE-399 Resource Management Errors
7% (11) CWE-264 Permissions, Privileges, and Access Controls
7% (11) CWE-189 Numeric Errors
2% (3) CWE-362 Race Condition
2% (3) CWE-287 Improper Authentication
2% (3) CWE-16 Configuration
1% (2) CWE-310 Cryptographic Issues
1% (2) CWE-200 Information Exposure
0% (1) CWE-255 Credentials Management
0% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-2 Inducing Account Lockout
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-12 Choosing a Message/Channel Identifier on a Public/Multicast Channel
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-21 Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-27 Leveraging Race Conditions via Symbolic Links
CAPEC-28 Fuzzing
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-36 Using Unpublished Web Service APIs
CAPEC-40 Manipulating Writeable Terminal Devices
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion

SAINT Exploits

Description Link
Internet Explorer iepeers.dll use-after-free vulnerability More info here
Microsoft Message Queuing buffer overflow More info here
Windows Server Service buffer overflow MS08-067 More info here
Windows RRAS memory corruption vulnerability More info here
Microsoft Agent crafted URL vulnerability More info here
Windows Task Scheduler buffer overflow More info here
Internet Explorer WinINet credential reflection vulnerability More info here
Microsoft WordPad Word97 text converter buffer overflow More info here
Windows Print Spooler EnumeratePrintShares buffer overflow More info here
Internet Explorer Tabular Data Control DataURL memory corruption More info here
Windows GDI EMF filename buffer overflow More info here
Microsoft DirectX DirectShow QuickTime movie parsing vulnerability More info here
Windows Animated Cursor Header buffer overflow More info here
Windows Media Unicast Service transport information packet buffer overflow More info here
Windows RPC DCOM interface buffer overflow More info here
Windows GDI Privilege Elevation More info here
Microsoft WINS replication service pointer corruption More info here
Windows DNS server RPC management interface buffer overflow More info here
Windows Media Player plugin EMBED buffer overflow More info here
Windows RASMAN registry corruption vulnerability More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
65225 Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
65224 Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Con...
65223 Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Es...
65217 Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
64925 Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption ...
64058 Microsoft Windows win32k.sys SfnINSTRING() Local DoS
64057 Microsoft Windows win32k.sys SfnLOGONNOTIFY() Local DoS
63765 Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieva...
63749 Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
63746 Microsoft Windows Authenticode Signature Verification Cabview Manipulation Pr...
63745 Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validati...
63736 Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
63733 Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privile...
63731 Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege...
63730 Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
63728 Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
63726 Microsoft Windows Media Unicast Service Transport Packet Handling Remote Over...
63335 Microsoft IE Unspecified Uninitialized Memory Corruption
63334 Microsoft IE Post Encoding Information Disclosure
63333 Microsoft IE Unspecified Race Condition Memory Corruption
63331 Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
63329 Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::Securit...
63328 Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
62810 Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
62756 Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Comm...

ExploitDB Exploits

id Description
17659 MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
16590 Internet Explorer DHTML Behaviors Use After Free
16333 Windows Media Services ConnectFunnel Stack Buffer Overflow
15266 Windows NTLM Weak Nonce Vulnerability
14895 MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit
14608 Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)
12273 Windows 7/2008R2 SMB Client Trans2 Stack Overflow 10-020 PoC
12032 Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution
11683 Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)
9893 Microsoft Internet Explorer 5,6,7 memory corruption PoC
3740 MS Windows DNS DnssrvQuery Remote Stack Overflow Exploit
1065 MS Windows (SMB) Transaction Response Handling Exploit (MS05-011)
1019 MS Windows COM Structured Storage Local Exploit (MS05-012)

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2011-11-21 Name : Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerab...
File : nvt/secpod_ms_windows_ip_validation_code_exec_vuln.nasl
2011-01-14 Name : Vulnerabilities in GDI Could Allow Remote Code Execution (925902)
File : nvt/gb_ms07-017.nasl
2011-01-14 Name : Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnera...
File : nvt/gb_ms07-021.nasl
2011-01-14 Name : Vulnerability in RPC Could Allow Denial of Service (933729)
File : nvt/gb_ms07-058.nasl
2011-01-13 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
File : nvt/gb_ms08-001.nasl
2011-01-10 Name : Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
File : nvt/gb_ms08-020.nasl
2011-01-10 Name : Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerab...
File : nvt/gb_ms08-025.nasl
2010-10-22 Name : Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
File : nvt/secpod_ms10-012-remote.nasl
2010-07-08 Name : Microsoft Windows GDI Multiple Vulnerabilities (925902)
File : nvt/ms07-017.nasl
2010-06-09 Name : Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (9...
File : nvt/secpod_ms10-032.nasl
2010-06-09 Name : Message Queuing Remote Code Execution Vulnerability (951071) - Remote
File : nvt/secpod_ms08-065_remote.nasl
2010-06-09 Name : Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability ...
File : nvt/secpod_ms10-034.nasl
2010-06-09 Name : Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vu...
File : nvt/secpod_ms10-037.nasl
2010-05-13 Name : Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
File : nvt/gb_ms_win_kernel_win32k_sys_mult_dos_vuln.nasl
2010-04-14 Name : Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
File : nvt/secpod_ms10-026.nasl
2010-04-14 Name : Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
File : nvt/secpod_ms10-027.nasl
2010-04-14 Name : Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
File : nvt/secpod_ms10-025.nasl
2010-04-14 Name : Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
File : nvt/secpod_ms10-022.nasl
2010-04-14 Name : Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
File : nvt/secpod_ms10-021.nasl
2010-04-14 Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
File : nvt/secpod_ms10-020.nasl
2010-04-14 Name : Microsoft Windows Authentication Verification Remote Code Execution Vulnerabi...
File : nvt/secpod_ms10-019.nasl
2010-04-01 Name : Microsoft Internet Explorer Multiple Vulnerabilities (980182)
File : nvt/secpod_ms10-018.nasl
2010-03-18 Name : Vulnerabilities in SMB Could Allow Remote Code Execution (958687) - Remote
File : nvt/secpod_ms09-001_remote.nasl
2010-03-16 Name : FreeBSD Ports: openoffice.org
File : nvt/freebsd_openoffice.org.nasl
2010-03-10 Name : MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability
File : nvt/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2010-A-0068 Microsoft Windows Media Services Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0024076
2010-A-0052 Microsoft Windows Media Player Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0024002
2010-A-0053 Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0023999
2010-B-0013 Microsoft Windows Kerberos Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0022675
2010-B-0014 Microsoft Paint Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0022674
2009-B-0069 Multiple Vulnerabilities in Indeo Codec affecting Microsoft Windows
Severity: Category II - VMSKEY: V0022163
2009-A-0126 Microsoft Internet Authentication Service Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0022101
2009-A-0128 Microsoft WordPad and Office Text Converters Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0021551
2009-A-0116 Microsoft Windows License Logging Server Remote Heap Buffer Overflow Vulnerab...
Severity: Category I - VMSKEY: V0021937
2009-A-0095 Multiple Vulnerabilities in Microsoft Windows CryptoAPI
Severity: Category I - VMSKEY: V0021760
2009-A-0097 Multiple Vulnerabilities in Microsoft Active Template Library
Severity: Category II - VMSKEY: V0021756
2009-B-0053 Microsoft Indexing Services Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0021750
2009-A-0091 Multiple Vulnerabilities in Microsoft Windows Media Runtime
Severity: Category II - VMSKEY: V0021744
2009-A-0067 Multiple Vulnerabilities in Microsoft Active Template Library
Severity: Category II - VMSKEY: V0019882
2009-B-0033 Multiple Vulnerabilities in Visual Studio Active Template Library
Severity: Category II - VMSKEY: V0019798
2009-A-0034 Microsoft Windows HTTP Services Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0018756
2009-A-0032 Multiple Vulnerabilities in WordPad and Office Text Converters
Severity: Category I - VMSKEY: V0018752
2009-A-0018 Multiple Vulnerabilities in Windows DNS and WINS Servers
Severity: Category I - VMSKEY: V0018553
2009-A-0019 Microsoft Windows Secure Channel Vulnerability
Severity: Category II - VMSKEY: V0018549
2008-A-0086 Microsoft GDI Remote Code Execution Vulnerabilities
Severity: Category II - VMSKEY: V0017910
2008-A-0081 Microsoft Server Service Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0017870
2008-B-0075 Microsoft Internet Printing Service Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0017793
2008-T-0056 Microsoft Message Queuing Service Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0017781
2008-T-0039 Multiple Microsoft Event System Remote Code Execution Vulnerabilities
Severity: Category I - VMSKEY: V0016744
2008-A-0060 Microsoft Windows Image Color Management System Vulnerability
Severity: Category I - VMSKEY: V0016737

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 DCERPC DIRECT-UDP msqueue function 4 little endian object call overflow attempt
RuleID : 9771 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP msqueue function 4 object call overflow attempt
RuleID : 9770 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP msqueue function 4 overflow attempt
RuleID : 9769 - Type : OS-WINDOWS - Revision : 13
2014-01-10 DCERPC NCACN-IP-TCP v4 msqueue function 4 little endian overflow attempt
RuleID : 9768 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT-UDP msqueue function 4 object call overflow attempt
RuleID : 9767 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT-UDP msqueue function 4 overflow attempt
RuleID : 9766 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT-UDP msqueue function 4 little endian overflow attempt
RuleID : 9765 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT-UDP v4 msqueue function 4 little endian overflow attempt
RuleID : 9764 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9759 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9758 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9757 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9756 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object...
RuleID : 9755 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9754 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9753 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal...
RuleID : 9752 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9751 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9750 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9749 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9748 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9747 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9746 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9745 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9744 - Type : NETBIOS - Revision : 7
2014-01-10 DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att...
RuleID : 9743 - Type : NETBIOS - Revision : 5

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-04-03 Name: The remote web server may allow remote code execution.
File: iis_7_pci.nasl - Type: ACT_GATHER_INFO
2014-10-10 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL10509.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host is potentially affected by a remote...
File: ms_dns_kb935966.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File: ms_dns_kb941672.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File: ms_dns_kb951746.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File: ms_dns_kb961063.nasl - Type: ACT_GATHER_INFO
2011-01-27 Name: The remote SuSE 10 host is missing a security-related patch.
File: suse_flash-player-6386.nasl - Type: ACT_GATHER_INFO
2010-10-11 Name: The remote SuSE 10 host is missing a security-related patch.
File: suse_java-1_5_0-ibm-6741.nasl - Type: ACT_GATHER_INFO
2010-09-13 Name: It is possible to execute arbitrary code on the remote Windows host due to fl...
File: smb_kb971468.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20090908-tcp24http.nasl - Type: ACT_GATHER_INFO
2010-06-09 Name: The Windows kernel is affected by several vulnerabilities that could allow es...
File: smb_nt_ms10-032.nasl - Type: ACT_GATHER_INFO
2010-06-09 Name: The remote Windows host is missing an update that disables selected ActiveX c...
File: smb_nt_ms10-034.nasl - Type: ACT_GATHER_INFO
2010-06-09 Name: The remote Windows host contains a font driver that is affected by a privileg...
File: smb_nt_ms10-037.nasl - Type: ACT_GATHER_INFO
2010-04-27 Name: The remote media service is affected by a remote code execution vulnerability.
File: smb_kb_980858.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The remote Windows host has multiple code execution vulnerabilities.
File: smb_nt_ms10-019.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: Arbitrary code can be executed on the remote host through the installed SMB c...
File: smb_nt_ms10-020.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The Windows kernel is affected by eight vulnerabilities, including some that ...
File: smb_nt_ms10-021.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: Arbitrary code can be executed on the remote host through the installed VBScr...
File: smb_nt_ms10-022.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The remote media service has a buffer overflow vulnerability.
File: smb_nt_ms10-025.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: An audio codec on the remote Windows host has a buffer overflow vulnerability.
File: smb_nt_ms10-026.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The remote Windows host has an ActiveX control that is affected by a code exe...
File: smb_nt_ms10-027.nasl - Type: ACT_GATHER_INFO
2010-03-30 Name: Arbitrary code can be executed on the remote host through a web browser.
File: smb_nt_ms10-018.nasl - Type: ACT_GATHER_INFO
2010-03-01 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_c97d7a37223311df96dd001b2134ef46.nasl - Type: ACT_GATHER_INFO
2010-02-12 Name: The remote Windows host has a program affected by multiple buffer overflows.
File: openoffice_32.nasl - Type: ACT_GATHER_INFO
2010-02-09 Name: Arbitrary code can be executed on the remote host through Microsoft Paint.
File: smb_nt_ms10-005.nasl - Type: ACT_GATHER_INFO