A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled.
References
Link | Resource |
---|---|
https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ | Patch Vendor Advisory |
https://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/98550 | Third Party Advisory VDB Entry |
https://support.microsoft.com/en-us/help/4022747/security-update-for-windows-xp-and-windows-server-2003 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/98752 | Third Party Advisory VDB Entry |
https://blog.0patch.com/2017/06/a-quick-analysis-of-microsofts.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-06-22 07:29
Updated : 2019-10-24 08:15
NVD link : CVE-2017-0176
Mitre link : CVE-2017-0176
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
microsoft
- windows_xp
- windows_server_2003