MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066)

High Nessus Plugin ID 18023


Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP stack.


The remote host runs a version of Windows that has a flaw in its TCP/IP stack.

The flaw could allow an attacker to execute arbitrary code with SYSTEM privileges on the remote host, or to perform a denial of service attack against the remote host.

Proof of concept code is available to perform a Denial of Service against a vulnerable system.


Microsoft has released a set of patches for Windows 2000, XP and 2003.

See Also

Plugin Details

Severity: High

ID: 18023

File Name: smb_nt_ms05-019.nasl

Version: $Revision: 1.41 $

Type: local

Agent: windows

Published: 2005/04/12

Modified: 2017/08/09

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

Temporal Vector: CVSS2#E:F/RL:ND/RC:ND

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/04/12

Vulnerability Publication Date: 2005/03/05

Reference Information

CVE: CVE-2004-0230, CVE-2004-0790, CVE-2004-1060, CVE-2005-0048, CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, CVE-2005-0068, CVE-2005-0688

BID: 13116, 13124, 13658

OSVDB: 4030, 14578, 15457, 15463, 15619, 15620, 15621, 15622, 15623

MSFT: MS05-019

CERT: 222750, 233754, 396645, 415294

EDB-ID: 276, 291, 861, 948, 24030, 24031, 24032, 24033, 25383, 25388, 25389

MSKB: 893066