CVE-2004-0207
https://notcve.org/view.php?id=CVE-2004-0207
"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions. Vulnerabilidad de estilo "hacer añicos" en la interfaz de programación de aplicación (API) de Administración de Windows en Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales ganar privilegios usando ciertas funciones de API para cambiar las propiedades de programas privilegiados usando las funciones de API SetWindowLong y SetWIndowLongPtr. • http://marc.info/?l=bugtraq&m=109777417922695&w=2 http://www.kb.cert.org/vuls/id/218526 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16579 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 •
CVE-2004-0208
https://notcve.org/view.php?id=CVE-2004-0208
The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. El subsistema de Máquina Virtual DOS de Microsoft Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales acceder a memoria del kernel y ganar privilegios mediante un programa malicioso que modifica ciertas estructuras de sistema de manera que no es validado adecuadamente por funciones privilegiadas del sistema operativo. • http://marc.info/?l=bugtraq&m=109772135404427&w=2 http://www.kb.cert.org/vuls/id/910998 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16580 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1751 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3161 https://oval.cisecurity.org/re •
CVE-2004-0574 – Microsoft Windows NNTP Service (XPAT) - Denial of Service (MS04-036)
https://notcve.org/view.php?id=CVE-2004-0574
The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. El componente de Protocolo de Transferencia de Noticias de Red (NNTP) de Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, y Exchange Server 2003 permite a atacantes remtos ejecutar código de su elección mediante patrones XPAT, posiblemente relacionado con una validación de longitud inadecuada o un "búfer sin comprobar", conduciendo a desbordamientos de búfer basados en la pila y error de fuera por uno. • https://www.exploit-db.com/exploits/578 http://marc.info/?l=bugtraq&m=109761632831563&w=2 http://www.ciac.org/ciac/bulletins/p-012.shtml http://www.coresecurity.com/common/showdoc.php?idx=420&idxseccion=10 http://www.kb.cert.org/vuls/id/203126 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036 https://exchange.xforce.ibmcloud.com/vulnerabilities/17641 https://exchange.xforce.ibmcloud.com/vulnerabilities/17661 https://oval.cisecurity.org/repository/s • CWE-787: Out-of-bounds Write •
CVE-2004-1649
https://notcve.org/view.php?id=CVE-2004-1649
Buffer overflow in Microsoft Msinfo32.exe might allow local users to execute arbitrary code via a long filename in the msinfo_file command line parameter. NOTE: this issue might not cross security boundaries, so it may be REJECTED in the future. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025902.html http://marc.info/?l=bugtraq&m=109413415205017&w=2 http://marc.info/?l=full-disclosure&m=109391133831787&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/17153 •
CVE-2004-0839
https://notcve.org/view.php?id=CVE-2004-0839
Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html". • http://marc.info/?l=bugtraq&m=109303291513335&w=2 http://marc.info/?l=bugtraq&m=109336221826652&w=2 http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html http://www.kb.cert.org/vuls/id/526089 http://www.securityfocus.com/bid/10973 http://www.us-cert.gov/cas/techalerts/TA04-293A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 https://exchange.xforce.ibmcloud.com/vulnerabilities/17044 https://oval.cisecurity.org/repository/search •