Description
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
Published: 2004-12-31
Score: 7.5 High
EPSS: 25.3% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Microsoft Windows 2000 Windows 2003 Server Windows Nt
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:24:26.555Z

Reserved: 2004-06-15T00:00:00.000Z

Link: CVE-2004-0567

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2004-12-31T05:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2004-0567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses