Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1080 | First vendor Publication | 2005-01-10 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1080 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1549 | |||
Oval ID: | oval:org.mitre.oval:def:1549 | ||
Title: | WINS Association Context Vulnerability (64-bit Server 2003, Test 1) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 1 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:2541 | |||
Oval ID: | oval:org.mitre.oval:def:2541 | ||
Title: | WINS Association Context Vulnerability (Windows 2000) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:2734 | |||
Oval ID: | oval:org.mitre.oval:def:2734 | ||
Title: | WINS Association Context Vulnerability (Terminal Server Test 1) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 2 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:3677 | |||
Oval ID: | oval:org.mitre.oval:def:3677 | ||
Title: | WINS Association Context Vulnerability (64-bit Server 2003, Test 2) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 1 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:4372 | |||
Oval ID: | oval:org.mitre.oval:def:4372 | ||
Title: | WINS Association Context Vulnerability (Terminal Server Test 2) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 3 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:4831 | |||
Oval ID: | oval:org.mitre.oval:def:4831 | ||
Title: | WINS Association Context Vulnerability (NT 4.0) | ||
Description: | The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1080 | Version: | 3 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows NT 4.0 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Microsoft WINS replication service pointer corruption | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-09-20 | Microsoft WINS Service Memory Overwrite |
2005-04-12 | MS Windows (WINS) Remote Buffer Overflow Exploit (v.3) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12378 | Microsoft Windows WINS Association Context Validation Remote Code Execution Microsoft Windows Server contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is due to an error in 'WINS.EXE' when handling replication packets. By sending a specially crafted WINS replication packet containing a modified memory pointer, a remote attacker could execute arbitrary code resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 3017-community - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 3017 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS association context validation overflow attempt RuleID : 18320 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS overflow attempt RuleID : 11684 - Revision : 8 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-12-15 | Name : Arbitrary code can be executed on the remote host. File : wins_replication_overflow.nasl - Type : ACT_GATHER_INFO |
2004-12-14 | Name : Arbitrary code can be executed on the remote host via the WINS service. File : smb_nt_ms04-045.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:35 |
|
2024-11-28 12:06:16 |
|
2024-08-02 12:02:54 |
|
2024-08-02 01:01:33 |
|
2024-02-02 01:02:39 |
|
2024-02-01 12:01:34 |
|
2023-09-05 12:02:31 |
|
2023-09-05 01:01:25 |
|
2023-09-02 12:02:33 |
|
2023-09-02 01:01:25 |
|
2023-08-12 12:03:04 |
|
2023-08-12 01:01:26 |
|
2023-08-11 12:02:39 |
|
2023-08-11 01:01:27 |
|
2023-08-06 12:02:27 |
|
2023-08-06 01:01:27 |
|
2023-08-04 12:02:31 |
|
2023-08-04 01:01:27 |
|
2023-07-14 12:02:29 |
|
2023-07-14 01:01:27 |
|
2023-03-29 01:02:31 |
|
2023-03-28 12:01:32 |
|
2022-10-11 12:02:13 |
|
2022-10-11 01:01:19 |
|
2021-05-04 12:02:27 |
|
2021-04-22 01:02:37 |
|
2020-05-23 13:16:44 |
|
2020-05-23 00:15:57 |
|
2019-05-09 12:01:24 |
|
2019-04-30 21:19:18 |
|
2018-10-13 00:22:30 |
|
2017-10-11 09:23:25 |
|
2017-07-11 12:01:33 |
|
2016-10-18 12:01:24 |
|
2016-06-28 15:06:36 |
|
2016-04-26 12:55:33 |
|
2016-03-06 09:24:50 |
|
2016-03-06 05:24:18 |
|
2014-02-17 10:28:24 |
|
2014-01-19 21:22:21 |
|
2013-05-11 11:43:47 |
|