Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0567 | First vendor Publication | 2004-12-31 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0567 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 | |
Os | 2 | |
Os | 2 |
ExploitDB Exploits
id | Description |
---|---|
2010-09-20 | Microsoft WINS Service Memory Overwrite |
2005-04-12 | MS Windows (WINS) Remote Buffer Overflow Exploit (v.3) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12370 | Microsoft Windows WINS Computer Name Validation Remote Code Execution A remote overflow exists in Microsoft Windows. WINS fails to perform proper bounds checking on the 'name' parameter on incoming WINS packets resulting in a buffer overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 3017-community - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 3017 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS association context validation overflow attempt RuleID : 18320 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 11684 - Revision : 8 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-12-15 | Name : Arbitrary code can be executed on the remote host. File : wins_replication_overflow.nasl - Type : ACT_GATHER_INFO |
2004-12-14 | Name : Arbitrary code can be executed on the remote host via the WINS service. File : smb_nt_ms04-045.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:37 |
|
2024-11-28 12:06:07 |
|
2024-08-02 12:02:48 |
|
2024-08-02 01:01:30 |
|
2024-02-02 01:02:34 |
|
2024-02-01 12:01:32 |
|
2023-09-05 12:02:26 |
|
2023-09-05 01:01:23 |
|
2023-09-02 12:02:28 |
|
2023-09-02 01:01:23 |
|
2023-08-12 12:02:59 |
|
2023-08-12 01:01:23 |
|
2023-08-11 12:02:34 |
|
2023-08-11 01:01:25 |
|
2023-08-06 12:02:22 |
|
2023-08-06 01:01:24 |
|
2023-08-04 12:02:26 |
|
2023-08-04 01:01:24 |
|
2023-07-14 12:02:24 |
|
2023-07-14 01:01:25 |
|
2023-03-29 01:02:26 |
|
2023-03-28 12:01:29 |
|
2022-10-11 12:02:09 |
|
2022-10-11 01:01:17 |
|
2021-05-04 12:02:21 |
|
2021-04-22 01:02:30 |
|
2020-05-23 00:15:49 |
|
2019-05-09 12:01:23 |
|
2019-04-30 21:19:18 |
|
2018-10-13 00:22:29 |
|
2017-07-11 12:01:27 |
|
2016-06-28 15:05:57 |
|
2016-04-26 12:51:03 |
|
2014-02-17 10:27:41 |
|
2014-01-19 21:22:13 |
|
2013-05-11 11:42:03 |
|