Vulnerability CVE-2004-0362


Published: 2004-04-15   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
ISS -> Blackice agent server 
ISS -> Blackice pc protection 
ISS -> Blackice server protection 
ISS -> Realsecure desktop 
ISS -> Realsecure guard 
ISS -> Realsecure network sensor 
ISS -> Realsecure sentry 
ISS -> Realsecure server sensor 
ISS -> Proventia a series xpu 
ISS -> Proventia g series xpu 
ISS -> Proventia m series xpu 

 References:
http://marc.info/?l=bugtraq&m=107965651712378&w=2
http://www.ciac.org/ciac/bulletins/o-104.shtml
http://www.eeye.com/html/Research/Advisories/AD20040318.html
http://www.kb.cert.org/vuls/id/947254
http://www.securityfocus.com/bid/9913
http://xforce.iss.net/xforce/alerts/id/166
http://xforce.iss.net/xforce/xfdb/15442
http://xforce.iss.net/xforce/xfdb/15543

Copyright 2024, cxsecurity.com

 

Back to Top