Описание
Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-0214
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15956
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17662
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1601
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1749
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2638
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4345
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5307
- http://seclists.org/lists/bugtraq/2004/Apr/0322.html
- http://seclists.org/lists/fulldisclosure/2004/Apr/0933.html
- http://secunia.com/advisories/11482
- http://securitytracker.com/id?1011647
- http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B322857
- http://support.microsoft.com/default.aspx?scid=kb;en-us;322857
- http://www.kb.cert.org/vuls/id/616200
- http://www.osvdb.org/5687
- http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html
- http://www.securityfocus.com/bid/10213
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
EPSS