Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/586540 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/361836 | Patch Vendor Advisory |
http://www.us-cert.gov/cas/techalerts/TA04-104A.html | Third Party Advisory US Government Resource |
http://xforce.iss.net/xforce/alerts/id/168 | Patch Vendor Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A889 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A903 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A951 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-06-01 04:00
Updated : 2024-02-04 16:31
NVD link : CVE-2003-0719
Mitre link : CVE-2003-0719
CVE.ORG link : CVE-2003-0719
JSON object : View
Products Affected
microsoft
- windows_me
- windows_2003_server
- windows_xp
- windows_2000
- netmeeting
- windows_nt
- windows_98
CWE