CVE-2003-0719 – Microsoft IIS 5.0 - SSL Remote Buffer Overflow (MS04-011)
https://notcve.org/view.php?id=CVE-2003-0719
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. Desbordamiento de búfer en la implementación del protocolo Private Communications Transport (PCT) en la librería SSL de Microsoft, usada en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME. • https://www.exploit-db.com/exploits/275 https://www.exploit-db.com/exploits/16334 http://www.kb.cert.org/vuls/id/586540 http://www.securityfocus.com/archive/1/361836 http://www.us-cert.gov/cas/techalerts/TA04-104A.html http://xforce.iss.net/xforce/alerts/id/168 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 https://oval.cisecurity.org/repository/ •
CVE-2003-0906
https://notcve.org/view.php?id=CVE-2003-0906
Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image. Desbordamiento de búfer en el dibujado de los formatos de imagen (1) Windows Metafile (WMF) o (2) Enhanced Metafile (EMF) en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, y XP SP1 permite a atacantes remotos ejecutar código arbitrario mediante una imagen WMF o EMF malformada. • http://www.kb.cert.org/vuls/id/547028 http://www.securityfocus.com/bid/10120 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1064 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A897 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A959 •
CVE-2003-0910 – Microsoft Windows NT 4.0/2000 - Local Descriptor Table Privilege Escalation (MS04-011)
https://notcve.org/view.php?id=CVE-2003-0910
The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory. La función NtSetLdtEntries en el interfaz de programación de la Tabla de Descriptores L ocales (LDT) de Windows NT 4.0 y Windows 2000 permitea atacantes locales ganar acceso a memoria del kernel y ejecutar código de su elección mediante un cierto tipo descriptor de segmento de datos que apunta a memoria protegida. • https://www.exploit-db.com/exploits/23989 http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413D.html http://www.kb.cert.org/vuls/id/122076 http://www.securityfocus.com/bid/10122 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com •
CVE-2004-0118
https://notcve.org/view.php?id=CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code. El componente del subsistema de la Máquina Virtual DOS (VDM) en Windows NT 4.0 y Windows 2000 no valida adecuadamente estructuras de sistema, lo que permite a usuarios locales acceder a memoria protegida del kernel y ejecutar código de su elección. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413E.html http://www.kb.cert.org/vuls/id/783748 http://www.securityfocus.com/bid/10117 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15714 https://oval.cisecurity.or •
CVE-2004-0119
https://notcve.org/view.php?id=CVE-2004-0119
The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. El intefaz Negotiate Security Software Provider (SSP) en Windows 2000, Windows XP y Windows Server 2003 permite a atacantes remotos causar una denegación de servicio (caída por desreferencia nula) o ejecutar código de su elección mediante una petición SPNEGO NegTokenInit especialemente elaborada durante la selección del protocolo de autenticación. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0081.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/638548 http://www.securityfocus.com/bid/10113 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15715 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808 https:/& • CWE-476: NULL Pointer Dereference •