Description
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Iss
Subscribe
Blackice Agent Server
Subscribe
Blackice Pc Protection
Subscribe
Blackice Server Protection
Subscribe
Proventia A Series Xpu
Subscribe
Proventia G Series Xpu
Subscribe
Proventia M Series Xpu
Subscribe
Realsecure Desktop
Subscribe
Realsecure Guard
Subscribe
Realsecure Network Sensor
Subscribe
Realsecure Sentry
Subscribe
Realsecure Server Sensor
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:17:14.262Z
Reserved: 2004-03-18T00:00:00.000Z
Link: CVE-2004-0362
No data.
Status : Modified
Published: 2004-04-15T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2004-0362
No data.
OpenCVE Enrichment
No data.
Weaknesses