The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2004-12-31T05:00:00
Updated: 2024-08-08T00:24:26.555Z
Reserved: 2004-06-15T00:00:00
Link: CVE-2004-0567
Vulnrichment
No data.
NVD
Status : Modified
Published: 2004-12-31T05:00:00.000
Modified: 2024-11-20T23:48:52.437
Link: CVE-2004-0567
Redhat
No data.