CVE-2005-1184 – Multiple Vendor - TCP Session Acknowledgement Number Denial of Service
https://notcve.org/view.php?id=CVE-2005-1184
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated. • https://www.exploit-db.com/exploits/25439 http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html http://seclists.org/lists/fulldisclosure/2005/Apr/0383.html http://seclists.org/lists/fulldisclosure/2005/Apr/0385.html http://www.securityfocus.com/bid/13215 https://exchange.xforce.ibmcloud.com/vulnerabilities/40502 •
CVE-2004-1306 – Microsoft Windows XP/2000/2003 - 'winhlp32' Phrase Integer Overflow
https://notcve.org/view.php?id=CVE-2004-1306
Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file. El desbordamiento de búfer basado en memoria dinámica (heap) en winhlp32.exe en Windows NT, Windows 2000 a SP4, Windows XP a SP2 y Windows 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un archivo.hlp diseñado. • https://www.exploit-db.com/exploits/25049 http://marc.info/?l=bugtraq&m=110383690219440&w=2 http://www.securityfocus.com/bid/12092 http://www.xfocus.net/flashsky/icoExp https://exchange.xforce.ibmcloud.com/vulnerabilities/18678 •
CVE-2004-0568
https://notcve.org/view.php?id=CVE-2004-0568
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. La aplicación Hyperterminal de Windows NT 4.0, 2000, XP y Server 2003 no valida adecuadamente la longitud de un valor guardado en un fichero de sesión, lo que permite a atacantes remotos ejecutar código arbitrario mediante un fichero de sesión de HyperTerminal (.ht) malicioso, sitio web, o URL Telnet contenida en un mensaje de correo electrónico, disparando un desbordamiento de búfer. • http://marc.info/?l=bugtraq&m=110312618614849&w=2 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043 https://exchange.xforce.ibmcloud.com/vulnerabilities/18336 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1603 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2545 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3138 https://oval.cisecurity.org/repository/search •
CVE-2004-0893
https://notcve.org/view.php?id=CVE-2004-0893
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." La interfaz de Llamada a Procedimiento Local (LPC) en el kernel de Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 no valida adecuadamente la longitud de mensajes enviádos al puerto LCP, lo que permite a usuarios locales ganar privilegios, también conocida como "Vulnerabilidad del kernel de Windows" • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/18339 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1321 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1561 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1581 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1886 https://ov •
CVE-2004-0894 – Microsoft Windows - Improper Token Validation Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-0894
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program. El Servicio del Subsistema de la Autoridad de Seguridad Local (LSASS) de Windows 2000 Server and Windows Server 2003 no valida adecuadamente la información de conexión, lo que permite a usuarios locales ganar privilegios mediante un programa especialmente diseñado. • https://www.exploit-db.com/exploits/749 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/18340 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1888 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2062 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3312 https://oval.cisecurity.org/repository/search/definition/ova •