Lucene search

K
cve[email protected]CVE-2004-0362
HistoryApr 15, 2004 - 4:00 a.m.

CVE-2004-0362

2004-04-1504:00:00
web.nvd.nist.gov
40
icq
buffer overflow
iss
protocol analysis module
pam
realsecure
proventia
blackice
remote code execution
cve-2004-0362

7.7 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%

Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.

Affected configurations

NVD
Node
issblackice_agent_serverMatch3.6ebz
OR
issblackice_agent_serverMatch3.6eca
OR
issblackice_agent_serverMatch3.6ecb
OR
issblackice_agent_serverMatch3.6ecc
OR
issblackice_agent_serverMatch3.6ecd
OR
issblackice_agent_serverMatch3.6ece
OR
issblackice_agent_serverMatch3.6ecf
OR
issblackice_pc_protectionMatch3.6cbz
OR
issblackice_pc_protectionMatch3.6cca
OR
issblackice_pc_protectionMatch3.6ccb
OR
issblackice_pc_protectionMatch3.6ccc
OR
issblackice_pc_protectionMatch3.6ccd
OR
issblackice_pc_protectionMatch3.6cce
OR
issblackice_pc_protectionMatch3.6ccf
OR
issblackice_server_protectionMatch3.6cbz
OR
issblackice_server_protectionMatch3.6cca
OR
issblackice_server_protectionMatch3.6ccb
OR
issblackice_server_protectionMatch3.6ccc
OR
issblackice_server_protectionMatch3.6ccd
OR
issblackice_server_protectionMatch3.6cce
OR
issblackice_server_protectionMatch3.6ccf
OR
issrealsecure_desktopMatch3.6ebz
OR
issrealsecure_desktopMatch3.6eca
OR
issrealsecure_desktopMatch3.6ecb
OR
issrealsecure_desktopMatch3.6ecd
OR
issrealsecure_desktopMatch3.6ece
OR
issrealsecure_desktopMatch3.6ecf
OR
issrealsecure_desktopMatch7.0eba
OR
issrealsecure_desktopMatch7.0ebf
OR
issrealsecure_desktopMatch7.0ebg
OR
issrealsecure_desktopMatch7.0ebh
OR
issrealsecure_desktopMatch7.0ebj
OR
issrealsecure_desktopMatch7.0ebk
OR
issrealsecure_desktopMatch7.0ebl
OR
issrealsecure_guardMatch3.6ebz
OR
issrealsecure_guardMatch3.6eca
OR
issrealsecure_guardMatch3.6ecb
OR
issrealsecure_guardMatch3.6ecc
OR
issrealsecure_guardMatch3.6ecd
OR
issrealsecure_guardMatch3.6ece
OR
issrealsecure_guardMatch3.6ecf
OR
issrealsecure_network_sensorMatch7.0
OR
issrealsecure_network_sensorMatch7.0xpu_20.11
OR
issrealsecure_network_sensorMatch7.0xpu_22.10
OR
issrealsecure_network_sensorMatch7.0xpu_22.4
OR
issrealsecure_network_sensorMatch7.0xpu_22.9
OR
issrealsecure_sentryMatch3.6ebz
OR
issrealsecure_sentryMatch3.6eca
OR
issrealsecure_sentryMatch3.6ecb
OR
issrealsecure_sentryMatch3.6ecc
OR
issrealsecure_sentryMatch3.6ecd
OR
issrealsecure_sentryMatch3.6ece
OR
issrealsecure_sentryMatch3.6ecf
OR
issrealsecure_server_sensorMatch6.0windows
OR
issrealsecure_server_sensorMatch6.0.1windows
OR
issrealsecure_server_sensorMatch6.0.1_win_sr1.1
OR
issrealsecure_server_sensorMatch6.5windows
OR
issrealsecure_server_sensorMatch6.5sr3.2windows
OR
issrealsecure_server_sensorMatch6.5sr3.3windows
OR
issrealsecure_server_sensorMatch6.5_win_sr3.1
OR
issrealsecure_server_sensorMatch6.5_win_sr3.4
OR
issrealsecure_server_sensorMatch6.5_win_sr3.5
OR
issrealsecure_server_sensorMatch6.5_win_sr3.6
OR
issrealsecure_server_sensorMatch6.5_win_sr3.7
OR
issrealsecure_server_sensorMatch6.5_win_sr3.8
OR
issrealsecure_server_sensorMatch6.5_win_sr3.9
OR
issrealsecure_server_sensorMatch6.5_win_sr3.10
OR
issrealsecure_server_sensorMatch7.0xpu22.1
OR
issrealsecure_server_sensorMatch7.0xpu22.10
OR
issrealsecure_server_sensorMatch7.0xpu22.11
OR
issrealsecure_server_sensorMatch7.0xpu22.2
OR
issrealsecure_server_sensorMatch7.0xpu22.3
OR
issrealsecure_server_sensorMatch7.0xpu22.4
OR
issrealsecure_server_sensorMatch7.0xpu22.5
OR
issrealsecure_server_sensorMatch7.0xpu22.6
OR
issrealsecure_server_sensorMatch7.0xpu22.7
OR
issrealsecure_server_sensorMatch7.0xpu22.8
OR
issrealsecure_server_sensorMatch7.0xpu22.9
Node
issproventia_a_series_xpuMatch20.11
OR
issproventia_a_series_xpuMatch22.1
OR
issproventia_a_series_xpuMatch22.2
OR
issproventia_a_series_xpuMatch22.3
OR
issproventia_a_series_xpuMatch22.4
OR
issproventia_a_series_xpuMatch22.5
OR
issproventia_a_series_xpuMatch22.6
OR
issproventia_a_series_xpuMatch22.7
OR
issproventia_a_series_xpuMatch22.8
OR
issproventia_a_series_xpuMatch22.9
OR
issproventia_a_series_xpuMatch22.10
OR
issproventia_g_series_xpuMatch22.1
OR
issproventia_g_series_xpuMatch22.2
OR
issproventia_g_series_xpuMatch22.3
OR
issproventia_g_series_xpuMatch22.4
OR
issproventia_g_series_xpuMatch22.5
OR
issproventia_g_series_xpuMatch22.6
OR
issproventia_g_series_xpuMatch22.7
OR
issproventia_g_series_xpuMatch22.8
OR
issproventia_g_series_xpuMatch22.9
OR
issproventia_g_series_xpuMatch22.10
OR
issproventia_g_series_xpuMatch22.11
OR
issproventia_m_series_xpuMatch1.1
OR
issproventia_m_series_xpuMatch1.2
OR
issproventia_m_series_xpuMatch1.3
OR
issproventia_m_series_xpuMatch1.4
OR
issproventia_m_series_xpuMatch1.5
OR
issproventia_m_series_xpuMatch1.6
OR
issproventia_m_series_xpuMatch1.7
OR
issproventia_m_series_xpuMatch1.8
OR
issproventia_m_series_xpuMatch1.9

7.7 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%