Описание
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0812
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-049
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A331
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A575
- http://marc.info/?l=bugtraq&m=106859247713009&w=2
- http://marc.info/?l=bugtraq&m=106865197102041&w=2
- http://www.cert.org/advisories/CA-2003-28.html
- http://www.cisco.com/warp/public/707/cisco-sa-20040129-ms03-049.shtml
- http://www.kb.cert.org/vuls/id/567620
- http://www.securityfocus.com/bid/9011
EPSS
CVE ID
Связанные уязвимости
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
EPSS