The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA04-196A.html | patch us government resource broken link third party advisory |
http://www.kb.cert.org/vuls/id/647436 | patch third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2166 | signature vdb entry broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2847 | signature vdb entry broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16590 | third party advisory vdb entry |