7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8 High
AI Score
Confidence
High
0.902 High
EPSS
Percentile
98.8%
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an “unchecked buffer” and possibly triggers a buffer overflow, aka the “Name Validation Vulnerability.”
secunia.com/advisories/13466
securitytracker.com/id?1012517
www.ciac.org/ciac/bulletins/p-054.shtml
www.kb.cert.org/vuls/id/378160
www.osvdb.org/12370
www.securityfocus.com/bid/11922
docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045
exchange.xforce.ibmcloud.com/vulnerabilities/18259