Описание
Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0806
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15702
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A895
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A896
- http://www.ciac.org/ciac/bulletins/o-114.shtml
- http://www.kb.cert.org/vuls/id/471260
- http://www.securityfocus.com/bid/10126
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
EPSS
Процентиль: 98%
0.491
Средний
CVE ID
Связанные уязвимости
nvd
больше 21 года назад
Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
EPSS
Процентиль: 98%
0.491
Средний