CVE-2004-0567

critical

Description

The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/18259

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045

http://www.securityfocus.com/bid/11922

http://www.osvdb.org/12370

http://www.kb.cert.org/vuls/id/378160

http://www.ciac.org/ciac/bulletins/p-054.shtml

http://securitytracker.com/id?1012517

http://secunia.com/advisories/13466

Details

Source: Mitre, NVD

Published: 2004-12-31

Updated: 2019-04-30

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical