This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2015-04-14
Product Windows Server 2003 Last view 2019-05-16
Version r2 Type Os
Update sp2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2003

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2019-05-16 CVE-2019-0708

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

7.2 2015-06-09 CVE-2015-2360

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2015-06-09 CVE-2015-1727

Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Pool Buffer Overflow Vulnerability."

7.2 2015-06-09 CVE-2015-1726

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1725

Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Buffer Overflow Vulnerability."

7.2 2015-06-09 CVE-2015-1724

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1723

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Station Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1722

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1721

The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability."

7.2 2015-06-09 CVE-2015-1720

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability."

7.2 2015-04-14 CVE-2015-1644

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows MS-DOS Device Name Vulnerability."

7.2 2015-04-14 CVE-2015-1643

Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "NtCreateTransactionManager Type Confusion Vulnerability."

CWE : Common Weakness Enumeration

%idName
41% (5) CWE-416 Use After Free
25% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (2) CWE-264 Permissions, Privileges, and Access Controls
8% (1) CWE-476 NULL Pointer Dereference
8% (1) CWE-20 Improper Input Validation

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0091 Multiple Vulnerabilities in Microsoft Windows (MS15-038)
Severity: Category II - VMSKEY: V0059897

Snort® IPS/IDS

Date Description
2019-05-21 Microsoft Windows RDP MS_T120 channel bind attempt
RuleID : 50137-community - Type : OS-WINDOWS - Revision : 2
2019-06-18 Microsoft Windows RDP MS_T120 channel bind attempt
RuleID : 50137 - Type : OS-WINDOWS - Revision : 2
2015-08-14 Microsoft Windows clipboard null pointer dereference attempt
RuleID : 35113 - Type : OS-WINDOWS - Revision : 2
2015-08-14 Microsoft Windows clipboard null pointer dereference attempt
RuleID : 35112 - Type : OS-WINDOWS - Revision : 2
2015-07-13 Microsoft Windows 8 CreateWindowEx privilege escalation attempt
RuleID : 34789 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows 8 CreateWindowEx privilege escalation attempt
RuleID : 34788 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows device context memory corruption attempt
RuleID : 34787 - Type : FILE-OTHER - Revision : 3
2015-07-13 Microsoft Windows device context memory corruption attempt
RuleID : 34786 - Type : FILE-OTHER - Revision : 3
2015-07-13 Microsoft Windows window placement invalid memory write attempt
RuleID : 34785 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows window placement invalid memory write attempt
RuleID : 34784 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows BrushAttributes use-after-free attempt
RuleID : 34783 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows BrushAttributes use-after-free attempt
RuleID : 34782 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows device context visible region memory corruption attempt
RuleID : 34781 - Type : FILE-OTHER - Revision : 3
2015-07-13 Microsoft Windows device context visible region memory corruption attempt
RuleID : 34780 - Type : FILE-OTHER - Revision : 3
2015-07-13 Microsoft Windows bitmap menu item use after free attempt
RuleID : 34771 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows bitmap menu item use after free attempt
RuleID : 34770 - Type : OS-WINDOWS - Revision : 3
2015-07-08 Microsoft Windows clipboard null pointer dereference privilege escalation att...
RuleID : 34762 - Type : OS-WINDOWS - Revision : 5
2015-07-08 Microsoft Windows clipboard null pointer dereference privilege escalation att...
RuleID : 34761 - Type : OS-WINDOWS - Revision : 5
2015-05-14 Microsoft Windows NtCreateTransactionManager type confusion attempt
RuleID : 34096 - Type : OS-WINDOWS - Revision : 3
2015-05-14 Microsoft Windows NtCreateTransactionManager type confusion attempt
RuleID : 34095 - Type : OS-WINDOWS - Revision : 3
2015-05-14 Microsoft Windows DosDevices mapping privilege escalation attempt
RuleID : 34081 - Type : FILE-EXECUTABLE - Revision : 3
2015-05-14 Microsoft Windows DosDevices mapping privilege escalation attempt
RuleID : 34080 - Type : FILE-EXECUTABLE - Revision : 3
2015-05-14 Microsoft Windows DosDevices mapping privilege escalation attempt
RuleID : 34079 - Type : FILE-EXECUTABLE - Revision : 3
2015-05-14 Microsoft Windows DosDevices mapping privilege escalation attempt
RuleID : 34078 - Type : FILE-EXECUTABLE - Revision : 3

Nessus® Vulnerability Scanner

id Description
2015-06-09 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-061.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms15-038.nasl - Type: ACT_GATHER_INFO