MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066) (uncredentialed check)

High Nessus Plugin ID 18028


Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP stack.


The remote host runs a version of Windows that has a flaw in its TCP/IP stack.

The flaw may allow an attacker to execute arbitrary code with SYSTEM privileges on the remote host or to perform a denial of service attack against the remote host.

Proof of concept code is available to perform a denial of service attack against a vulnerable system.


Microsoft has released a set of patches for Windows 2000, XP and 2003.

See Also

Plugin Details

Severity: High

ID: 18028

File Name: smb_kb893066.nasl

Version: $Revision: 1.35 $

Type: remote

Agent: windows

Family: Windows

Published: 2005/04/12

Modified: 2017/08/30

Dependencies: 12213, 11936

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

Temporal Vector: CVSS2#E:F/RL:ND/RC:ND

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: TCP/seq_window_flaw, Host/OS, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2004/04/20

Reference Information

CVE: CVE-2005-0048, CVE-2004-0790, CVE-2004-1060, CVE-2004-0230, CVE-2005-0688

BID: 13124, 13116

OSVDB: 14578, 15457, 15463, 15619, 4030

MSFT: MS05-019

MSKB: 893066