Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
References
Link | Resource |
---|---|
http://secunia.com/advisories/10611 | |
http://www.cert.org/advisories/CA-2004-01.html | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/749342 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/9406 | |
http://www.securityfocus.com/bid/9408 | Patch Vendor Advisory |
http://www.securitytracker.com/id?1008698 | |
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-001 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A478 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2004-01-15T05:00:00
Updated: 2018-10-12T19:57:01
Reserved: 2003-09-18T00:00:00
Link: CVE-2003-0819
JSON object: View
NVD Information
Status : Modified
Published: 2004-02-17T05:00:00.000
Modified: 2018-10-12T21:33:24.757
Link: CVE-2003-0819
JSON object: View
Redhat Information
No data.
CWE