Page 3 of 71 results (0.005 seconds)

CVSS: 7.1EPSS: 11%CPEs: 16EXPL: 4

srv.sys in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via an SMB WRITE_ANDX packet with an offset that is inconsistent with the packet size, related to "insufficiently validating the buffer size," as demonstrated by a request to the \PIPE\lsarpc named pipe, aka "SMB Validation Denial of Service Vulnerability." SRV.sys en el servicio de servidor en Microsoft Windows versiones 2000 SP4, XP SP2 y SP3, Server 2003 SP1 y SP2, vista Gold y SP1, y Server 2008 permite a los atacantes remotos causar una denegación de servicio (bloqueo de sistema) o posiblemente tener otro impacto no especificado por medio de un paquete SMB WRITE_ANDX con un desplazamiento que es incompatible con el tamaño del paquete, relacionado con "insufficiently validating the buffer size", como fue demostrado por una petición a la tubería llamada \PIPE\lsarpc , también conocida como "SMB Validation Denial of Service Vulnerability" • https://www.exploit-db.com/exploits/6463 http://secunia.com/advisories/31883 http://www.reversemode.com/index.php?option=com_content&task=view&id=54&Itemid=1 http://www.securityfocus.com/archive/1/496354/100/0/threaded http://www.securityfocus.com/bid/31179 http://www.securitytracker.com/id?1020887 http://www.us-cert.gov/cas/techalerts/TA09-013A.html http://www.vallejo.cc/proyectos/vista_SMB_write_DoS.htm http://www.vupen.com/english/advisories/2008/2583 https:/ • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 43%CPEs: 9EXPL: 0

Buffer overflow in msjet40.dll before 4.0.9505.0 in Microsoft Jet Database Engine allows remote attackers to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as CVE-2007-6026. Un desbordamiento de búfer en la biblioteca msjet40.dll anterior a la versión 4.0.9505.0 en el Motor de Base de datos de Microsoft Jet permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo de Word creado, tal y como se explotó “in the wild” en marzo de 2008. NOTA: a partir de 20080513, Microsoft ha declarado que este es el mismo problema que el CVE-2007-6026. • http://marc.info/?l=bugtraq&m=121129490723574&w=2 http://www.kb.cert.org/vuls/id/936529 http://www.microsoft.com/technet/security/advisory/950627.mspx http://www.securitytracker.com/id?1019686 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028 https://exchange.xforce.ibmcloud.com/vulnerabilities/41380 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 58%CPEs: 7EXPL: 0

Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote attackers to execute arbitrary code via a crafted script request. Búfer overflow basado en montículo en el objeto OLE (Object Linking and Embedding)Automation en Windows 2000 SP4, XP SP2, Server 2003 SP1 y SP2, Vista, Office 2004 para Mac, y Visual basic 6.0 SP6, permite a atacantes remotos ejecutar código de su elección a través de una petición de secuencia de comandos manipulada. • http://marc.info/?l=bugtraq&m=120361015026386&w=2 http://secunia.com/advisories/28902 http://www.securityfocus.com/bid/27661 http://www.securitytracker.com/id?1019373 http://www.us-cert.gov/cas/techalerts/TA08-043C.html http://www.vupen.com/english/advisories/2008/0510/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-008 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5388 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 94%CPEs: 5EXPL: 0

Unspecified vulnerability in Active Directory on Microsoft Windows 2000 and Windows Server 2003, and Active Directory Application Mode (ADAM) on XP and Server 2003, allows remote attackers to cause a denial of service (hang and restart) via a crafted LDAP request. Vulnerabilidad sin especificar en Active Directory de Microsoft Windows 2000 y Windows Server 2003 y Active Directory Application Mode (ADAM) de XP y Server 2003. Permite a atacantes remotos provocar una denegación de servicio (cuelgue y reinicio) a través de una petición LDAP manipulada. • http://marc.info/?l=bugtraq&m=120361015026386&w=2 http://secunia.com/advisories/28764 http://www.securityfocus.com/bid/27638 http://www.securitytracker.com/id?1019382 http://www.us-cert.gov/cas/techalerts/TA08-043C.html http://www.vupen.com/english/advisories/2008/0505/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5181 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Local Security Authority Subsystem Service (LSASS) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows local users to gain privileges via a crafted local procedure call (LPC) request. Vulnerabilidad no especificada en Local Security Authority Subsystem Service (LSASS) en Microsoft Windows 2000 SP4, XP SP2, y Server 2003 SP1 y SP2 permite a usuarios locales ganar privilegios a través de una respuesta de procedimiento de llamada local (LPC). • http://secunia.com/advisories/28341 http://securitytracker.com/id?1019165 http://www.kb.cert.org/vuls/id/410025 http://www.securityfocus.com/archive/1/486317/100/0/threaded http://www.securityfocus.com/bid/27099 http://www.us-cert.gov/cas/techalerts/TA08-008A.html http://www.vupen.com/english/advisories/2008/0070 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-002 https://exchange.xforce.ibmcloud.com/vulnerabilities/39233 https://oval.cisecurity& • CWE-264: Permissions, Privileges, and Access Controls •