The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA04-196A.html | us government resource broken link patch third party advisory |
http://www.kb.cert.org/vuls/id/647436 | us government resource patch third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2166 | broken link signature vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 | vendor advisory patch |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2847 | broken link signature vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16590 | third party advisory vdb entry |