Vulnerabilites related to nortel - ip_softphone_2050
Vulnerability from fkie_nvd
Published
2004-12-15 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2004-12/0167.htmlExploit, Vendor Advisory
cve@mitre.orghttp://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm
cve@mitre.orghttp://secunia.com/advisories/13482/Patch, Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/356600Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/11950Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-039A.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18504
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.htmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13482/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/356600Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11950Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-039A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18504
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "48E2627D-3244-4A66-9EF6-B790EEFD0D4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:optivity_telephony_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "162EA244-0CED-44BF-9857-13127C833FB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "294EBA01-147B-4DA0-937E-ACBB655EDE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "4E8B7346-F2AA-434C-A048-7463EC1BB117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "BE1A6107-DE00-4A1C-87FC-9E4015165B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "E69D0E21-8C62-403E-8097-2CA403CBBB1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
                     matchCriteriaId: "B127407D-AE50-4AFE-A780-D85B5AF44A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "5D42E51C-740A-4441-8BAF-D073111B984C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
                     matchCriteriaId: "34ACB544-87DD-4D9A-99F0-A10F48C1EE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "74AD256D-4BCE-41FB-AD73-C5C63A59A06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
                     matchCriteriaId: "B518E945-5FDE-4A37-878D-6946653C91F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
                     matchCriteriaId: "2D3B703C-79B2-4FA2-9E12-713AB977A880",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA733AD2-D948-46A0-A063-D29081A56F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "799DA395-C7F8-477C-8BC7-5B4B88FB7503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "91D6D065-A28D-49DA-B7F4-38421FF86498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
                     matchCriteriaId: "BC176BB0-1655-4BEA-A841-C4158167CC9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
                     matchCriteriaId: "403945FA-8676-4D98-B903-48452B46F48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
                     matchCriteriaId: "4BF263CB-4239-4DB0-867C-9069ED02CAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
                     matchCriteriaId: "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
                     matchCriteriaId: "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
                     matchCriteriaId: "6A05337E-18A5-4939-85A0-69583D9B5AD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
                     matchCriteriaId: "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
                     matchCriteriaId: "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
                     matchCriteriaId: "FB2BE2DE-7B06-47ED-A674-15D45448F357",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by \"AbusiveParent\" in Internet Explorer 6.0.2900.2180.",
      },
   ],
   id: "CVE-2004-1319",
   lastModified: "2024-11-20T23:50:35.560",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-15T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/13482/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/356600",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11950",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-039A.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18504",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/13482/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/356600",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-039A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18504",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2024-11-20 23:49
Severity ?
Summary
Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109303291513335&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109336221826652&w=2
cve@mitre.orghttp://seclists.org/lists/fulldisclosure/2004/Aug/0868.htmlVendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/526089Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/10973Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-293A.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17044
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109303291513335&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109336221826652&w=2
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/lists/fulldisclosure/2004/Aug/0868.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/526089Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/10973Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-293A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17044
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9692F8E9-E8E9-43A8-87D5-F2409333F8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "24DF2AB3-DEAB-4D70-986E-FFBB7E64B96A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "DA3D2175-7DF7-4D57-8B26-5BA68EF7A935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A04FEA6-37B0-44B0-844F-55652ABA1F85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "4D56FB8E-2553-47C1-82A2-9E59023780CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "8541EEED-94F4-42F8-9719-57F3EC85D52B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "40372520-08CF-4F64-A7AC-7E0AE0964138",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "2EB39B99-91A0-4B70-B12A-BA37F6AFBA83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "40F8042F-C621-45AE-9F8C-70469579643A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "2CD04E07-3664-4D4F-BF3E-6B33AF0F2D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D05ED9D0-CF78-4FAD-9371-6FB3D5825148",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19F6133-25D1-44A5-B6B9-354703436783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88301496-BED2-45EB-BF19-5F5BF2957373",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB0BA4C-BA48-4DDA-917E-9EA9E04A898F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D190CA6-7807-4361-8FB8-C015B21E66B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "48E2627D-3244-4A66-9EF6-B790EEFD0D4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:optivity_telephony_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "162EA244-0CED-44BF-9857-13127C833FB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_centre_portal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17F13410-3380-4CB8-9E20-92E14B85ADC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_client:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "872353DB-616C-46F8-99F1-7C7B56DEF34F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E25F5CF2-F891-41CA-A40C-13966F72FDF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7417958C-5321-41D6-9D1A-D16BF5511E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "294EBA01-147B-4DA0-937E-ACBB655EDE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "4E8B7346-F2AA-434C-A048-7463EC1BB117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "BE1A6107-DE00-4A1C-87FC-9E4015165B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "E69D0E21-8C62-403E-8097-2CA403CBBB1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
                     matchCriteriaId: "B127407D-AE50-4AFE-A780-D85B5AF44A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "5D42E51C-740A-4441-8BAF-D073111B984C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
                     matchCriteriaId: "34ACB544-87DD-4D9A-99F0-A10F48C1EE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "74AD256D-4BCE-41FB-AD73-C5C63A59A06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
                     matchCriteriaId: "B518E945-5FDE-4A37-878D-6946653C91F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
                     matchCriteriaId: "2D3B703C-79B2-4FA2-9E12-713AB977A880",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA733AD2-D948-46A0-A063-D29081A56F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "799DA395-C7F8-477C-8BC7-5B4B88FB7503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "91D6D065-A28D-49DA-B7F4-38421FF86498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
                     matchCriteriaId: "BC176BB0-1655-4BEA-A841-C4158167CC9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
                     matchCriteriaId: "403945FA-8676-4D98-B903-48452B46F48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
                     matchCriteriaId: "4BF263CB-4239-4DB0-867C-9069ED02CAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
                     matchCriteriaId: "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
                     matchCriteriaId: "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
                     matchCriteriaId: "6A05337E-18A5-4939-85A0-69583D9B5AD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
                     matchCriteriaId: "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
                     matchCriteriaId: "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
                     matchCriteriaId: "FB2BE2DE-7B06-47ED-A674-15D45448F357",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by \"wottapoop.html\".",
      },
   ],
   id: "CVE-2004-0839",
   lastModified: "2024-11-20T23:49:32.330",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-08-18T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109303291513335&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109336221826652&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/526089",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/10973",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-293A.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17044",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109303291513335&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109336221826652&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/526089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/10973",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-293A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17044",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110382854111833&w=2
cve@mitre.orghttp://www.kb.cert.org/vuls/id/177584Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/697136Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-012A.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.xfocus.net/flashsky/icoExp/Vendor Advisory
cve@mitre.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18667
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110382854111833&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/177584Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/697136Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-012A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.xfocus.net/flashsky/icoExp/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18667
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712
Impacted products
Vendor Product Version
nortel ip_softphone_2050 *
nortel media_communication_server_5100 3.0
nortel media_communication_server_5200 3.0
nortel media_processing_server *
nortel periphonics *
nortel symposium_agent *
nortel symposium_network_control_center *
nortel symposium_tapi_service_provider *
nortel symposium_web_centre_portal *
nortel symposium_web_client *
nortel symposium_call_center_server *
nortel symposium_express_call_center *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2003_server enterprise
microsoft windows_2003_server enterprise_64-bit
microsoft windows_2003_server r2
microsoft windows_2003_server r2
microsoft windows_2003_server standard
microsoft windows_2003_server web
microsoft windows_98 *
microsoft windows_98se *
microsoft windows_me *
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_communication_server_5100:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A5FC74-1883-4B8E-BC95-2A1E1DC9263D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_communication_server_5200:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E1E251E-BB18-4610-875D-C7FC95621368",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_processing_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "228FB6B6-F558-4D63-A34A-66DDD4B037FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:periphonics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8B62D86-AD1A-404D-9251-071DD6C9EE3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_agent:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD86C573-F25A-4825-9798-8BBC29A56320",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_network_control_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9FB826-61BA-4F13-8E0B-36DCCF30177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_tapi_service_provider:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AA64080-192C-41A3-A259-74499966C07D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_centre_portal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17F13410-3380-4CB8-9E20-92E14B85ADC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_client:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "872353DB-616C-46F8-99F1-7C7B56DEF34F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:symposium_call_center_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D73DA-C251-4CDE-A435-AE68876C9FC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:symposium_express_call_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8126E0-6887-48C3-BA2D-286E83AB73A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "294EBA01-147B-4DA0-937E-ACBB655EDE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "4E8B7346-F2AA-434C-A048-7463EC1BB117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "BE1A6107-DE00-4A1C-87FC-9E4015165B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "E69D0E21-8C62-403E-8097-2CA403CBBB1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
                     matchCriteriaId: "B127407D-AE50-4AFE-A780-D85B5AF44A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "5D42E51C-740A-4441-8BAF-D073111B984C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
                     matchCriteriaId: "34ACB544-87DD-4D9A-99F0-A10F48C1EE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "74AD256D-4BCE-41FB-AD73-C5C63A59A06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
                     matchCriteriaId: "B518E945-5FDE-4A37-878D-6946653C91F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
                     matchCriteriaId: "2D3B703C-79B2-4FA2-9E12-713AB977A880",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA733AD2-D948-46A0-A063-D29081A56F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "799DA395-C7F8-477C-8BC7-5B4B88FB7503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "237D7C18-C8D6-4FDB-A160-FA17DD46A55A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
                     matchCriteriaId: "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "6E7E6AD3-5418-4FEA-84B5-833059CA880D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "35346A7B-2CB5-446D-B0C3-1F21D71A746D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "064F4E76-1B89-4FA5-97ED-64624285C014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
                     matchCriteriaId: "089A953C-8446-4E6F-B506-430C38DF37B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "EA262C44-C0E6-493A-B8E5-4D26E4013226",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
                     matchCriteriaId: "416F06DD-980E-4A54-822D-CBA499FD1F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F66DC6FF-2B3D-4718-838F-9E055E89961F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
                     matchCriteriaId: "656AE014-AEEC-46E8-A696-61FEA7932F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
                     matchCriteriaId: "A08D0EA1-DA1B-4C52-883A-3F156F032517",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "DA267420-56C5-4697-B0AA-52932F78B24B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
                     matchCriteriaId: "93BA426E-DD51-44AC-BE78-3164670FF9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "224F8968-9F4C-4727-AAA3-61F5578EF54C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
                     matchCriteriaId: "02BE9817-E1AE-4619-8302-CA7AA4167F48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "363E3895-A19B-42EC-B479-765168DC0B17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
                     matchCriteriaId: "FBBBF25A-709B-4716-9894-AD82180091AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "407DA6E8-0832-49FE-AE14-35C104C237EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
                     matchCriteriaId: "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "81B7961D-151D-4773-80CB-CCD0456BFEAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
                     matchCriteriaId: "82781A72-A34F-4668-9EE8-C203B04E3367",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "AFE612D2-DF38-404F-AED1-B8C9C24012DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
                     matchCriteriaId: "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "B5CAF64E-98AA-4813-A2A2-5AC3387CF230",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
                     matchCriteriaId: "BCDFDBBA-6C4F-472A-9F4F-461C424794E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "BCC5E316-FB61-408B-BAA2-7FE03D581250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
                     matchCriteriaId: "EDDD8DA8-D074-4543-AEDF-F856B5567F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "CA7BA525-6DB8-4444-934A-932AFED69816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
                     matchCriteriaId: "90CFA69B-7814-4F97-A14D-D76310065CF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
                     matchCriteriaId: "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "91D6D065-A28D-49DA-B7F4-38421FF86498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*",
                     matchCriteriaId: "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
                     matchCriteriaId: "BC176BB0-1655-4BEA-A841-C4158167CC9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
                     matchCriteriaId: "403945FA-8676-4D98-B903-48452B46F48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
                     matchCriteriaId: "4BF263CB-4239-4DB0-867C-9069ED02CAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
                     matchCriteriaId: "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*",
                     matchCriteriaId: "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
                     matchCriteriaId: "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
                     matchCriteriaId: "6A05337E-18A5-4939-85A0-69583D9B5AD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
                     matchCriteriaId: "FB2BE2DE-7B06-47ED-A674-15D45448F357",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
      },
   ],
   id: "CVE-2004-1305",
   lastModified: "2024-11-20T23:50:33.340",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/177584",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/697136",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.xfocus.net/flashsky/icoExp/",
      },
      {
         source: "cve@mitre.org",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/177584",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/697136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.xfocus.net/flashsky/icoExp/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-23 17:46
Modified
2024-11-21 00:38
Severity ?
Summary
The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:nortel:ip_audio_conference_phone_2033:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3725D9C-E702-45F8-A647-BAA86EA060C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_1110:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC7EA846-6B58-4F88-91B2-770388BE5E2C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_1120e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9593EEF-CAC3-455B-972D-5DD2FE4802C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_1140e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1482953-C22F-4FA7-B262-52B136F578CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_1150e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B644B1-F5B9-4420-9908-CB4770B3F600",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_2001:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "645B8DCD-27BB-46B2-A41E-4EBC0674AD4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_2002:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D52E4B37-7699-41D0-A9B7-965A01808607",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:ip_phone_2004:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD0A3FFE-C169-4C4B-8DDD-B5EFA9ACE238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:wlan_handset_2210:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7F1EFF9-42CB-4F10-940F-E397ED56D423",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:wlan_handset_2211:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A490C36-F529-4448-A8DE-BE2C74041E19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:wlan_handset_2212:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7A9DC40-0269-403C-8D86-4EE094C5493E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:wlan_handset_6120:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54772D2C-5460-4C63-A22A-DBBC497BFBA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:wlan_handset_6140:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D18F26-40F0-4041-95B0-6A2153DD1261",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "48E2627D-3244-4A66-9EF6-B790EEFD0D4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.",
      },
      {
         lang: "es",
         value: "El Nortel UNIStim IP Softphone 2050, IP Phone 1140E, y otros Nortel IP Phone, Mobile Voice Client, y productos WLAN Handsets permite a atacantes remotos provocar denegación de servicio (cuelgue del dispositivo) a travé sd eun flujo de mensajes Mute y UnMute que tienen una fuente de dirección IP falsa para el Signaling Server.",
      },
   ],
   id: "CVE-2007-5639",
   lastModified: "2024-11-21T00:38:22.167",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2007-10-23T17:46:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://securityreason.com/securityalert/3273",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/482480/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/26122",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securityreason.com/securityalert/3273",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/482480/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/26122",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-23 17:46
Modified
2024-11-21 00:38
Severity ?
Summary
Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka "extraneous messaging."
Impacted products
Vendor Product Version
nortel ip_softphone_2050 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka \"extraneous messaging.\"",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en Nortel UNIStim IP Softphone 2050 permite a atacantes remotos provocar denegación de servicio (abortar aplicación) y posiblemente ejecutar código de su elección a través de una inundación de carácteres no válidos en el puerto RTCP (5678/udp) que dispara un mensaje de error Windows, también conocido como \"mensaje extraño\".",
      },
   ],
   id: "CVE-2007-5636",
   lastModified: "2024-11-21T00:38:21.740",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-10-23T17:46:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/38521",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27252",
      },
      {
         source: "cve@mitre.org",
         url: "http://securityreason.com/securityalert/3271",
      },
      {
         source: "cve@mitre.org",
         url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/482476/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/26118",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2007/3540",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37256",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/38521",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27252",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securityreason.com/securityalert/3271",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/482476/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/26118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/3540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37256",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2004-1319
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:46:12.504Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "13482",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13482/",
               },
               {
                  name: "ie-dhtml-xss(18504)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18504",
               },
               {
                  name: "TA05-039A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA05-039A.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
               },
               {
                  name: "oval:org.mitre.oval:def:3851",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851",
               },
               {
                  name: "11950",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11950",
               },
               {
                  name: "oval:org.mitre.oval:def:1114",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114",
               },
               {
                  name: "oval:org.mitre.oval:def:3464",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464",
               },
               {
                  name: "MS05-013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MS",
                     "x_transferred",
                  ],
                  url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013",
               },
               {
                  name: "20041215 MSIE DHTML Edit Control Cross Site Scripting Vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html",
               },
               {
                  name: "oval:org.mitre.oval:def:4758",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758",
               },
               {
                  name: "VU#356600",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/356600",
               },
               {
                  name: "oval:org.mitre.oval:def:1701",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by \"AbusiveParent\" in Internet Explorer 6.0.2900.2180.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-12T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "13482",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13482/",
            },
            {
               name: "ie-dhtml-xss(18504)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18504",
            },
            {
               name: "TA05-039A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA05-039A.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
            },
            {
               name: "oval:org.mitre.oval:def:3851",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851",
            },
            {
               name: "11950",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11950",
            },
            {
               name: "oval:org.mitre.oval:def:1114",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114",
            },
            {
               name: "oval:org.mitre.oval:def:3464",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464",
            },
            {
               name: "MS05-013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MS",
               ],
               url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013",
            },
            {
               name: "20041215 MSIE DHTML Edit Control Cross Site Scripting Vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html",
            },
            {
               name: "oval:org.mitre.oval:def:4758",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758",
            },
            {
               name: "VU#356600",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/356600",
            },
            {
               name: "oval:org.mitre.oval:def:1701",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1319",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by \"AbusiveParent\" in Internet Explorer 6.0.2900.2180.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "13482",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13482/",
                  },
                  {
                     name: "ie-dhtml-xss(18504)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18504",
                  },
                  {
                     name: "TA05-039A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA05-039A.html",
                  },
                  {
                     name: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
                     refsource: "MISC",
                     url: "http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3851",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851",
                  },
                  {
                     name: "11950",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11950",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1114",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3464",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464",
                  },
                  {
                     name: "MS05-013",
                     refsource: "MS",
                     url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013",
                  },
                  {
                     name: "20041215 MSIE DHTML Edit Control Cross Site Scripting Vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:4758",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758",
                  },
                  {
                     name: "VU#356600",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/356600",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1701",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1319",
      datePublished: "2005-01-06T05:00:00",
      dateReserved: "2005-01-06T00:00:00",
      dateUpdated: "2024-08-08T00:46:12.504Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2004-0839
Vulnerability from cvelistv5
Published
2004-09-14 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.171Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:7721",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721",
               },
               {
                  name: "10973",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/10973",
               },
               {
                  name: "20040824 What A Drag! -revisited-",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109336221826652&w=2",
               },
               {
                  name: "MS04-038",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MS",
                     "x_transferred",
                  ],
                  url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038",
               },
               {
                  name: "oval:org.mitre.oval:def:6272",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272",
               },
               {
                  name: "20040818 What A Drag II XP SP2",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html",
               },
               {
                  name: "oval:org.mitre.oval:def:2073",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073",
               },
               {
                  name: "20040818 What A Drag II XP SP2",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109303291513335&w=2",
               },
               {
                  name: "TA04-293A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA04-293A.html",
               },
               {
                  name: "oval:org.mitre.oval:def:4152",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152",
               },
               {
                  name: "oval:org.mitre.oval:def:3773",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773",
               },
               {
                  name: "VU#526089",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/526089",
               },
               {
                  name: "ie-dragdrop-code-execution(17044)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17044",
               },
               {
                  name: "oval:org.mitre.oval:def:1563",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-08-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by \"wottapoop.html\".",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-12T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:7721",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721",
            },
            {
               name: "10973",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/10973",
            },
            {
               name: "20040824 What A Drag! -revisited-",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=109336221826652&w=2",
            },
            {
               name: "MS04-038",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MS",
               ],
               url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038",
            },
            {
               name: "oval:org.mitre.oval:def:6272",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272",
            },
            {
               name: "20040818 What A Drag II XP SP2",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html",
            },
            {
               name: "oval:org.mitre.oval:def:2073",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073",
            },
            {
               name: "20040818 What A Drag II XP SP2",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=109303291513335&w=2",
            },
            {
               name: "TA04-293A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA04-293A.html",
            },
            {
               name: "oval:org.mitre.oval:def:4152",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152",
            },
            {
               name: "oval:org.mitre.oval:def:3773",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773",
            },
            {
               name: "VU#526089",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/526089",
            },
            {
               name: "ie-dragdrop-code-execution(17044)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17044",
            },
            {
               name: "oval:org.mitre.oval:def:1563",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0839",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by \"wottapoop.html\".",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:7721",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721",
                  },
                  {
                     name: "10973",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/10973",
                  },
                  {
                     name: "20040824 What A Drag! -revisited-",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=109336221826652&w=2",
                  },
                  {
                     name: "MS04-038",
                     refsource: "MS",
                     url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038",
                  },
                  {
                     name: "oval:org.mitre.oval:def:6272",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272",
                  },
                  {
                     name: "20040818 What A Drag II XP SP2",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:2073",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073",
                  },
                  {
                     name: "20040818 What A Drag II XP SP2",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=109303291513335&w=2",
                  },
                  {
                     name: "TA04-293A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA04-293A.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:4152",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3773",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773",
                  },
                  {
                     name: "VU#526089",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/526089",
                  },
                  {
                     name: "ie-dragdrop-code-execution(17044)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17044",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1563",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0839",
      datePublished: "2004-09-14T04:00:00",
      dateReserved: "2004-09-08T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.171Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2004-1305
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:46:12.431Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:712",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
               },
               {
                  name: "oval:org.mitre.oval:def:2580",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
               },
               {
                  name: "VU#697136",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/697136",
               },
               {
                  name: "MS05-002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MS",
                     "x_transferred",
                  ],
                  url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.xfocus.net/flashsky/icoExp/",
               },
               {
                  name: "oval:org.mitre.oval:def:3216",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
               },
               {
                  name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
               },
               {
                  name: "win-ani-ratenumber-dos(18667)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
               },
               {
                  name: "TA05-012A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
               },
               {
                  name: "VU#177584",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/177584",
               },
               {
                  name: "oval:org.mitre.oval:def:1304",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
               },
               {
                  name: "oval:org.mitre.oval:def:3957",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-12T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:712",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
            },
            {
               name: "oval:org.mitre.oval:def:2580",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
            },
            {
               name: "VU#697136",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/697136",
            },
            {
               name: "MS05-002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MS",
               ],
               url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.xfocus.net/flashsky/icoExp/",
            },
            {
               name: "oval:org.mitre.oval:def:3216",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
            },
            {
               name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
            },
            {
               name: "win-ani-ratenumber-dos(18667)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
            },
            {
               name: "TA05-012A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
            },
            {
               name: "VU#177584",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/177584",
            },
            {
               name: "oval:org.mitre.oval:def:1304",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
            },
            {
               name: "oval:org.mitre.oval:def:3957",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1305",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:712",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
                  },
                  {
                     name: "oval:org.mitre.oval:def:2580",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
                  },
                  {
                     name: "VU#697136",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/697136",
                  },
                  {
                     name: "MS05-002",
                     refsource: "MS",
                     url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
                  },
                  {
                     name: "http://www.xfocus.net/flashsky/icoExp/",
                     refsource: "MISC",
                     url: "http://www.xfocus.net/flashsky/icoExp/",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3216",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
                  },
                  {
                     name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
                  },
                  {
                     name: "win-ani-ratenumber-dos(18667)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
                  },
                  {
                     name: "TA05-012A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
                  },
                  {
                     name: "VU#177584",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/177584",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1304",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3957",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1305",
      datePublished: "2005-01-06T05:00:00",
      dateReserved: "2004-12-21T00:00:00",
      dateUpdated: "2024-08-08T00:46:12.431Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2007-5636
Vulnerability from cvelistv5
Published
2007-10-23 17:00
Modified
2024-08-07 15:39
Severity ?
Summary
Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka "extraneous messaging."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:39:13.731Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20071018 Nortel UNIStim IP Softphone Buffer-Overflow",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/482476/100/0/threaded",
               },
               {
                  name: "27252",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27252",
               },
               {
                  name: "3271",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SREASON",
                     "x_transferred",
                  ],
                  url: "http://securityreason.com/securityalert/3271",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
               },
               {
                  name: "ADV-2007-3540",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/3540",
               },
               {
                  name: "38521",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/38521",
               },
               {
                  name: "nortel-ipsoftphone-rtcp-bo(37256)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37256",
               },
               {
                  name: "26118",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/26118",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-10-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka \"extraneous messaging.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20071018 Nortel UNIStim IP Softphone Buffer-Overflow",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/482476/100/0/threaded",
            },
            {
               name: "27252",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27252",
            },
            {
               name: "3271",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SREASON",
               ],
               url: "http://securityreason.com/securityalert/3271",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
            },
            {
               name: "ADV-2007-3540",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/3540",
            },
            {
               name: "38521",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/38521",
            },
            {
               name: "nortel-ipsoftphone-rtcp-bo(37256)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37256",
            },
            {
               name: "26118",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/26118",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5636",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka \"extraneous messaging.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20071018 Nortel UNIStim IP Softphone Buffer-Overflow",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/482476/100/0/threaded",
                  },
                  {
                     name: "27252",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27252",
                  },
                  {
                     name: "3271",
                     refsource: "SREASON",
                     url: "http://securityreason.com/securityalert/3271",
                  },
                  {
                     name: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
                     refsource: "MISC",
                     url: "http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt",
                  },
                  {
                     name: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
                     refsource: "CONFIRM",
                     url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203",
                  },
                  {
                     name: "ADV-2007-3540",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/3540",
                  },
                  {
                     name: "38521",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/38521",
                  },
                  {
                     name: "nortel-ipsoftphone-rtcp-bo(37256)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37256",
                  },
                  {
                     name: "26118",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/26118",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5636",
      datePublished: "2007-10-23T17:00:00",
      dateReserved: "2007-10-23T00:00:00",
      dateUpdated: "2024-08-07T15:39:13.731Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2007-5639
Vulnerability from cvelistv5
Published
2007-10-23 17:00
Modified
2024-08-07 15:39
Severity ?
Summary
The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:39:13.612Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
               },
               {
                  name: "3273",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SREASON",
                     "x_transferred",
                  ],
                  url: "http://securityreason.com/securityalert/3273",
               },
               {
                  name: "20071018 Nortel IP Phone Flooding Denial of Service",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/482480/100/0/threaded",
               },
               {
                  name: "26122",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/26122",
               },
               {
                  name: "nortel-ipphone-spoof-dos(37253)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-10-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
            },
            {
               name: "3273",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SREASON",
               ],
               url: "http://securityreason.com/securityalert/3273",
            },
            {
               name: "20071018 Nortel IP Phone Flooding Denial of Service",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/482480/100/0/threaded",
            },
            {
               name: "26122",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/26122",
            },
            {
               name: "nortel-ipphone-spoof-dos(37253)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5639",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
                     refsource: "MISC",
                     url: "http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt",
                  },
                  {
                     name: "3273",
                     refsource: "SREASON",
                     url: "http://securityreason.com/securityalert/3273",
                  },
                  {
                     name: "20071018 Nortel IP Phone Flooding Denial of Service",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/482480/100/0/threaded",
                  },
                  {
                     name: "26122",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/26122",
                  },
                  {
                     name: "nortel-ipphone-spoof-dos(37253)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37253",
                  },
                  {
                     name: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
                     refsource: "CONFIRM",
                     url: "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5639",
      datePublished: "2007-10-23T17:00:00",
      dateReserved: "2007-10-23T00:00:00",
      dateUpdated: "2024-08-07T15:39:13.612Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}