Page 83 of 431 results (0.006 seconds)

CVSS: 7.5EPSS: 97%CPEs: 8EXPL: 3

Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm. Desbordamiento de búfer basado en la pila en ciertas funciones de servicio de Active Directory en LSASRV.DLL de Local Security Authority Subsystem Service (LSASS) en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME permite a atacantes remotos ejecutar código arbitrario mediante un paquete que causa que la función DsRolerUpgradeDownlevelServer cree entradas de depuración largas en el fichero DCPROMO.LOG, como las explotadas por el gusano Sasser. • https://www.exploit-db.com/exploits/16368 https://www.exploit-db.com/exploits/293 https://www.exploit-db.com/exploits/295 http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020069.html http://marc.info/?l=bugtraq&m=108325860431471&w=2 http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413C.html http://www.kb.cert.org/vuls/id/753212 http://www.securityfocus.com/bid/10108 http://www.us-cert.gov/c •

CVSS: 5.0EPSS: 78%CPEs: 3EXPL: 0

An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field. Una función de activación en el servicio RPCSS relacionada con la activación DCOM de Microsoft Windows 2000, XP y 2004 permite a atacantes remotos causar una denegación de servicio (consumición de memoria) mediante una petición de activación con un campo de longitud largo. • http://secunia.com/advisories/11065 http://securitytracker.com/alerts/2004/Apr/1009758.html http://www.ciac.org/ciac/bulletins/o-115.shtml http://www.eeye.com/html/Research/Advisories/AD20040413A.html http://www.kb.cert.org/vuls/id/417052 http://www.securityfocus.com/bid/10127 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/15708 https: •

CVSS: 7.5EPSS: 54%CPEs: 7EXPL: 0

Double free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code. Vulnerabilidad de doble liberación de memoria en la librería ASN.1 usada en Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003, permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección. • http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/255924 http://www.securityfocus.com/bid/10118 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15713 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1007 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 96%CPEs: 3EXPL: 1

The Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages. La librería Microsoft Secure Sockets Layer (SSL), usada en Windows 2000, Windows XP y Windows Server 2003, permite a atacantes remotos causar una denegación de servicio mediante mensajes SSL malformados. • https://www.exploit-db.com/exploits/176 http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/150236 http://www.securityfocus.com/bid/10115 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15712 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A885 https://oval.cisecurity.org/repo •

CVSS: 7.5EPSS: 95%CPEs: 8EXPL: 2

Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. Desbordamiento de búfer en la implementación del protocolo Private Communications Transport (PCT) en la librería SSL de Microsoft, usada en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME. • https://www.exploit-db.com/exploits/275 https://www.exploit-db.com/exploits/16334 http://www.kb.cert.org/vuls/id/586540 http://www.securityfocus.com/archive/1/361836 http://www.us-cert.gov/cas/techalerts/TA04-104A.html http://xforce.iss.net/xforce/alerts/id/168 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 https://oval.cisecurity.org/repository/ •