Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0124 | First vendor Publication | 2004-06-01 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0124 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1041 | |||
Oval ID: | oval:org.mitre.oval:def:1041 | ||
Title: | DCOM RPC Object Identity Windows NT Vulnerability | ||
Description: | The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0124 | Version: | 2 |
Platform(s): | Microsoft Windows NT | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1062 | |||
Oval ID: | oval:org.mitre.oval:def:1062 | ||
Title: | DCOM RPC Object Identity Windows 2000 Vulnerability | ||
Description: | The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0124 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1066 | |||
Oval ID: | oval:org.mitre.oval:def:1066 | ||
Title: | DCOM RPC Object Identity Windows 2003 Vulnerability | ||
Description: | The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0124 | Version: | 1 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1072 | |||
Oval ID: | oval:org.mitre.oval:def:1072 | ||
Title: | DCOM RPC Object Identity Windows XP Vulnerability | ||
Description: | The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0124 | Version: | 7 |
Platform(s): | Microsoft Windows XP | Product(s): | Remote Procedure Call (RPC) |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 4 | |
Os | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-16 | Name : Microsoft RPC Interface Buffer Overrun (KB824146) File : nvt/msrpc_dcom2.nasl |
2005-11-03 | Name : Microsoft RPC Interface Buffer Overrun (823980) File : nvt/msrpc_dcom.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5247 | Microsoft Windows DCOM RPC Object Identity Information Disclosure Microsoft Windows contains a flaw that may result in a remote information disclosure. The issue is due to the DCOM RPC interface initiating network communications via an "alter context". If a remote attacker can manipulate the interface to use this feature, the service may start up network communications on additional ports that also leak sensitive data. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SMB-DS DCEPRC ORPCThis request flood attempt RuleID : 2496 - Revision : 14 - Type : NETBIOS |
2014-01-10 | SMB DCEPRC ORPCThis request flood attempt RuleID : 2495 - Revision : 14 - Type : NETBIOS |
2014-01-10 | DCEPRC ORPCThis request flood attempt RuleID : 2494 - Revision : 14 - Type : NETBIOS |
2014-01-10 | DCERPC ISystemActivate flood attempt RuleID : 21262 - Revision : 6 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-03-16 | Name : Arbitrary code can be executed on the remote host. File : smb_kb828741.nasl - Type : ACT_GATHER_INFO |
2004-04-13 | Name : Arbitrary code can be executed on the remote host. File : smb_nt_ms04-012.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:03 |
|
2024-11-28 12:06:00 |
|
2021-05-04 12:02:16 |
|
2021-04-22 01:02:25 |
|
2020-05-23 00:15:43 |
|
2018-10-13 00:22:28 |
|
2017-10-11 09:23:20 |
|
2017-07-11 12:01:23 |
|
2016-04-26 12:47:00 |
|
2014-02-17 10:27:11 |
|
2013-05-11 11:39:54 |
|