Summary |
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. |
oval
via4
|
accepted | 2007-05-23T15:05:26.193-04:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Glenn Strickland | organization | Secure Elements, Inc. |
| description | Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | family | windows | id | oval:org.mitre.oval:def:1093 | status | accepted | submitted | 2004-04-13T12:00:00.000-04:00 | title | Windows Server 2003 SSL PCT Handshake Vulnerability | version | 65 |
accepted | 2011-05-16T04:03:33.420-04:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Glenn Strickland | organization | Secure Elements, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | family | windows | id | oval:org.mitre.oval:def:889 | status | accepted | submitted | 2004-04-13T12:00:00.000-04:00 | title | Windows XP SSL PCT Handshake Vulnerability | version | 72 |
accepted | 2008-03-24T04:00:53.521-04:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Glenn Strickland | organization | Secure Elements, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Jonathan Baker | organization | The MITRE Corporation |
| definition_extensions | comment | Microsoft Windows NT is installed | oval | oval:org.mitre.oval:def:36 |
| description | Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | family | windows | id | oval:org.mitre.oval:def:903 | status | accepted | submitted | 2004-04-13T12:00:00.000-04:00 | title | Windows NT SSL PCT Handshake Vulnerability | version | 75 |
accepted | 2007-05-23T15:05:55.915-04:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Glenn Strickland | organization | Secure Elements, Inc. |
| description | Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | family | windows | id | oval:org.mitre.oval:def:951 | status | accepted | submitted | 2004-04-13T12:00:00.000-04:00 | title | Windows 2000 SSL PCT Handshake Vulnerability | version | 65 |
|