Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
References
Link | Resource |
---|---|
http://xforce.iss.net/xforce/alerts/id/168 | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/361836 | Patch Vendor Advisory |
http://www.us-cert.gov/cas/techalerts/TA04-104A.html | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/586540 | Patch Third Party Advisory US Government Resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A951 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A903 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A889 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-05-31 21:00
Updated : 2018-10-12 14:33
NVD link : CVE-2003-0719
Mitre link : CVE-2003-0719
JSON object : View
CWE
Products Affected
microsoft
- windows_2003_server
- windows_nt
- windows_98
- netmeeting
- windows_xp
- windows_me
- windows_2000