Lucene search

K
certCERTVU:353956
HistoryApr 14, 2004 - 12:00 a.m.

Microsoft Windows H.323 implementation fails to handle malformed requests

2004-04-1400:00:00
www.kb.cert.org
10

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.403 Medium

EPSS

Percentile

97.3%

Overview

A vulnerabilities in Microsoft Windows’ implementation of the multimedia telephony protocol H.323 could lead to the ability to remotely execute arbitrary code on the system.

Description

Microsoft Windows’ implementation of the H.323 protocol contains a buffer overflow in the handling of requests. An attacker may be able to send a crafted request to the vulnerable system and exploit this vulnerability to execute arbitrary code. This vulnerability affects the following systems:

* Windows XP
* Windows Server 2003
* Windows 2000
* Windows 98, 98 SE, ME 
* Systems running a stand-alone version of NetMeeting prior to version 3.01 (4.4.3399)  

Impact

An attacker may be able to send a crafted request to the vulnerable system and exploit this vulnerability to execute arbitrary code.


Solution

Apply a patch from the vendor
Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.


Vendor Information

353956

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: April 14, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Microsoft Security Bulletin MS04-011 contains information regarding this issue.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23353956 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx&gt;

Acknowledgements

Thanks to Microsoft for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2004-0117
Severity Metric: 34.26 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.403 Medium

EPSS

Percentile

97.3%