Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 | vdb entry signature |
http://www.securityfocus.com/archive/1/361836 | mailing list patch vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 | vendor advisory |
http://www.kb.cert.org/vuls/id/586540 | us government resource third party advisory patch |
http://www.us-cert.gov/cas/techalerts/TA04-104A.html | third party advisory us government resource |
http://xforce.iss.net/xforce/alerts/id/168 | third party advisory patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A889 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A903 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A951 | vdb entry signature |