CVE-2004-0575 Details

CVE-2004-0575

Published: 2004-11-03
Last Modified: 2018-10-12
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 10/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:N/AC:L/Au:N/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* Yes - -
cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* Yes - -
References

http://marc.info/?l=ntbugtraq&m=109767342326300&w=2
http://securitytracker.com/id?1011637
http://www.ciac.org/ciac/bulletins/p-010.shtml
http://www.eeye.com/html/research/advisories/AD20041012A.html
http://www.kb.cert.org/vuls/id/649374
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-034
https://exchange.xforce.ibmcloud.com/vulnerabilities/17624
https://exchange.xforce.ibmcloud.com/vulnerabilities/17659
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3913
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4276
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6397

CVE ID
CVE-2004-0575
Published
2004-11-03
Modified
2018-10-12
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.