10
CVSSv2

CVE-2004-1080

Published: 10/01/2005 Updated: 30/04/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote malicious users to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2003 server enterprise

microsoft windows 2003 server enterprise_64-bit

microsoft windows nt 4.0

microsoft windows 2003 server standard

microsoft windows 2003 server web

microsoft windows 2003 server 2000

microsoft windows 2003 server 2003

microsoft windows 2003 server r2

Exploits

## # $Id: ms04_045_winsrb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
/* Windows Internet Name Service (WINS) Remote Heap Buffer Overflow ------------------------------------ ------------------------------------ Advisory credits: ---------------- Nicolas Waisman of Immunity Inc (wwwimmunityseccom) Advisory link: -- ...