Description
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
Published: 2004-03-23
Score: 7.5 High
EPSS: 83.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.75731}

epss

{'score': 0.82829}


Subscriptions

Iss Blackice Agent Server Blackice Pc Protection Blackice Server Protection Proventia A Series Xpu Proventia G Series Xpu Proventia M Series Xpu Realsecure Desktop Realsecure Guard Realsecure Network Sensor Realsecure Sentry Realsecure Server Sensor
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:17:14.262Z

Reserved: 2004-03-18T00:00:00.000Z

Link: CVE-2004-0362

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2004-04-15T04:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2004-0362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses