Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
References
Link | Resource |
---|---|
http://secunia.com/advisories/10611 | |
http://www.cert.org/advisories/CA-2004-01.html | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/749342 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/9406 | |
http://www.securityfocus.com/bid/9408 | Patch Vendor Advisory |
http://www.securitytracker.com/id?1008698 | |
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-001 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A478 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2004-02-17 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2003-0819
Mitre link : CVE-2003-0819
CVE.ORG link : CVE-2003-0819
JSON object : View
Products Affected
microsoft
- proxy_server
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer