ID CVE-2003-0806
Summary Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
References
Vulnerable Configurations
  • Microsoft windows 2000_sp2
    cpe:2.3:o:microsoft:windows_2000:-:sp2
  • Microsoft windows 2000_sp3
    cpe:2.3:o:microsoft:windows_2000:-:sp3
  • cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
    cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
  • Microsoft Windows 4.0 sp6a
    cpe:2.3:o:microsoft:windows_nt:4.0:sp6a
  • Microsoft windows xp_sp1 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS04-011.NASL
description The remote host is missing a critical Microsoft Windows Security Update (835732). This update fixes various flaws that could allow an attacker to execute arbitrary code on the remote host. A series of worms (Sasser) are known to exploit this vulnerability in the wild.
last seen 2019-02-21
modified 2018-11-15
plugin id 12205
published 2004-04-13
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=12205
title MS04-011: Microsoft Hotfix (credentialed check) (835732)
oval via4
  • accepted 2011-05-16T04:00:13.592-04:00
    class vulnerability
    contributors
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Christine Walzer
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:1054
    status accepted
    submitted 2004-04-13T12:00:00.000-04:00
    title Windows XP winlogon Remote Buffer Overflow
    version 70
  • accepted 2008-03-24T04:00:52.475-04:00
    class vulnerability
    contributors
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    definition_extensions
    comment Microsoft Windows NT is installed
    oval oval:org.mitre.oval:def:36
    description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:895
    status accepted
    submitted 2004-04-13T12:00:00.000-04:00
    title Windows NT winlogon Remote Buffer Overflow
    version 68
  • accepted 2006-10-10T20:40:01.140-04:00
    class vulnerability
    contributors
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Christine Walzer
      organization The MITRE Corporation
    • name John Hoyland
      organization Centennial Software
    • name Matthew Wojcik
      organization The MITRE Corporation
    definition_extensions
    comment Microsoft Windows 2000 is installed
    oval oval:org.mitre.oval:def:85
    description Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:896
    status accepted
    submitted 2004-04-13T12:00:00.000-04:00
    title Windows 2000 winlogon Remote Buffer Overflow
    version 69
refmap via4
bid 10126
cert TA04-104A
cert-vn VU#471260
ciac O-114
ms MS04-011
xf win-winlogon-bo(15702)
Last major update 10-09-2008 - 15:20
Published 01-06-2004 - 00:00
Last modified 12-10-2018 - 17:33
Back to Top