Executive Summary

Informations
Name MS05-046 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution (899589)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1106
 
Oval ID: oval:org.mitre.oval:def:1106
Title: CSNW Remote Buffer Overflow via Network Messages (WinXP,SP1)
Description: The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1985
Version: 4
Platform(s): Microsoft Windows XP
Product(s): NetWare
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1210
 
Oval ID: oval:org.mitre.oval:def:1210
Title: CSNW Remote Buffer Overflow via Network Messages (WinXP,SP2)
Description: The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1985
Version: 5
Platform(s): Microsoft Windows XP
Product(s): NetWare
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1536
 
Oval ID: oval:org.mitre.oval:def:1536
Title: CSNW Remote Buffer Overflow via Network Messages (Win2k,SP4)
Description: The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1985
Version: 5
Platform(s): Microsoft Windows 2000
Product(s): NetWare
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1544
 
Oval ID: oval:org.mitre.oval:def:1544
Title: CSNW Remote Buffer Overflow via Network Messages (Server 2003)
Description: The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1985
Version: 5
Platform(s): Microsoft Windows Server 2003
Product(s): NetWare
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:910
 
Oval ID: oval:org.mitre.oval:def:910
Title: CSNW Remote Buffer Overflow via Network Messages (Server 2003,SP1)
Description: The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
Family: windows Class: vulnerability
Reference(s): CVE-2005-1985
Version: 4
Platform(s): Microsoft Windows Server 2003
Product(s): NetWare
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 2
Os 2

Open Source Vulnerability Database (OSVDB)

Id Description
19922 Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow

A remote overflow exists in Microsoft Windows. The 'Client Service for NetWare (CSNW)' fails to perform proper bounds checking resulting in a buffer overflow. With specially crafted network messages, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 SMB-DS v4 netware_cs function 43 unicode overflow attempt
RuleID : 4636 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 unicode little endian overflow attempt
RuleID : 4635 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 unicode little endian andx overflow attempt
RuleID : 4634 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 unicode andx overflow attempt
RuleID : 4633 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 overflow attempt
RuleID : 4632 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 little endian overflow attempt
RuleID : 4631 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 little endian andx overflow attempt
RuleID : 4630 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 andx overflow attempt
RuleID : 4629 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX unicode overflow attempt
RuleID : 4628 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX unicode little endian overflow att...
RuleID : 4627 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX unicode little endian andx overflo...
RuleID : 4626 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX unicode andx overflow attempt
RuleID : 4625 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX overflow attempt
RuleID : 4624 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX little endian overflow attempt
RuleID : 4623 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX little endian andx overflow attempt
RuleID : 4622 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS v4 netware_cs function 43 WriteAndX andx overflow attempt
RuleID : 4621 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 unicode overflow attempt
RuleID : 4620 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 unicode little endian overflow attempt
RuleID : 4619 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 unicode little endian andx overflow attempt
RuleID : 4618 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 unicode andx overflow attempt
RuleID : 4617 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 overflow attempt
RuleID : 4616 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 little endian overflow attempt
RuleID : 4615 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 little endian andx overflow attempt
RuleID : 4614 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 andx overflow attempt
RuleID : 4613 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX unicode overflow attempt
RuleID : 4612 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX unicode little endian overflow attempt
RuleID : 4611 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX unicode little endian andx overflow a...
RuleID : 4610 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX unicode andx overflow attempt
RuleID : 4609 - Revision : 6 - Type : NETBIOS
2014-01-10 DCERPC NCACN-IP-TCP netware_cs function 43 overflow attempt
RuleID : 4608 - Revision : 14 - Type : OS-WINDOWS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX little endian overflow attempt
RuleID : 4607 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX little endian andx overflow attempt
RuleID : 4606 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB-DS netware_cs function 43 WriteAndX andx overflow attempt
RuleID : 4605 - Revision : 6 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 unicode overflow attempt
RuleID : 4572 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 unicode little endian overflow attempt
RuleID : 4571 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 unicode little endian andx overflow attempt
RuleID : 4570 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 unicode andx overflow attempt
RuleID : 4569 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 overflow attempt
RuleID : 4568 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 little endian overflow attempt
RuleID : 4567 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 little endian andx overflow attempt
RuleID : 4566 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 andx overflow attempt
RuleID : 4565 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX unicode overflow attempt
RuleID : 4564 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX unicode little endian overflow attempt
RuleID : 4563 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX unicode little endian andx overflow a...
RuleID : 4562 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX unicode andx overflow attempt
RuleID : 4561 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX overflow attempt
RuleID : 4560 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX little endian overflow attempt
RuleID : 4559 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX little endian andx overflow attempt
RuleID : 4558 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB v4 netware_cs function 43 WriteAndX andx overflow attempt
RuleID : 4557 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 unicode overflow attempt
RuleID : 4556 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 unicode little endian overflow attempt
RuleID : 4555 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 unicode little endian andx overflow attempt
RuleID : 4554 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 unicode andx overflow attempt
RuleID : 4553 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 overflow attempt
RuleID : 4552 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 little endian overflow attempt
RuleID : 4551 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 little endian andx overflow attempt
RuleID : 4550 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 andx overflow attempt
RuleID : 4549 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX unicode overflow attempt
RuleID : 4548 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX unicode little endian overflow attempt
RuleID : 4547 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX unicode little endian andx overflow attempt
RuleID : 4546 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX unicode andx overflow attempt
RuleID : 4545 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX overflow attempt
RuleID : 4544 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX little endian overflow attempt
RuleID : 4543 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX little endian andx overflow attempt
RuleID : 4542 - Revision : 10 - Type : NETBIOS
2014-01-10 SMB netware_cs function 43 WriteAndX andx overflow attempt
RuleID : 4541 - Revision : 10 - Type : NETBIOS

Nessus® Vulnerability Scanner

Date Description
2005-10-11 Name : A flaw in the client service for NetWare may allow an attacker to execute arb...
File : smb_kb899589.nasl - Type : ACT_GATHER_INFO
2005-10-11 Name : A flaw in the client service for NetWare could allow an attacker to execute a...
File : smb_nt_ms05-046.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:45:16
  • Multiple Updates
2014-01-19 21:29:56
  • Multiple Updates