Buffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request. NOTE: this candidate may be split or merged with other candidates. This and other PROTOS-related candidates, especially CVE-2002-0012 and CVE-2002-0013, will be updated when more accurate information is available.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0013 | |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0012 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006 | vendor advisory |
http://www.cert.org/advisories/CA-2002-03.html | patch third party advisory us government resource |
http://www.kb.cert.org/vuls/id/107186 | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A402 | signature vdb entry |
http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html | |
http://www.kb.cert.org/vuls/id/854306 | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A209 | signature vdb entry |