Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Iss
Subscribe
|
Blackice Agent Server
Subscribe
Blackice Pc Protection
Subscribe
Blackice Server Protection
Subscribe
Proventia A Series Xpu
Subscribe
Proventia G Series Xpu
Subscribe
Proventia M Series Xpu
Subscribe
Realsecure Desktop
Subscribe
Realsecure Guard
Subscribe
Realsecure Network Sensor
Subscribe
Realsecure Sentry
Subscribe
Realsecure Server Sensor
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:17:14.262Z
Reserved: 2004-03-18T00:00:00
Link: CVE-2004-0362
No data.
Status : Deferred
Published: 2004-04-15T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0362
No data.
OpenCVE Enrichment
No data.
Weaknesses