4.120051116211011Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTED'The Exchange 2003 Exadmin virtual directory uses only Integrated Windows Authentication.'2.1.6ACCEPTED1Corresponds to item 2.1.6 in the Exchange 2003 BenchmarkMicrosoft Windows 2000Internet Explorer 5.5 Service Pack 2David ProulxInternet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.CVE-2002-0026ACCEPTED3Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in the chunked encoding transfer mechanism in Internet Information Server (IIS) 4.0 and 5.0 Active Server Pages allows attackers to cause a denial of service or execute arbitrary code.CVE-2002-0079ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0David ProulxChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.CVE-2002-0023ACCEPTED4Microsoft Windows NTWindows ShellMatthew BurtonMatthew BurtonDRAFTINTERIMMatthew BurtonACCEPTEDBuffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.CVE-2002-0070ACCEPTED1Microsoft Windows 2000Internet Explorer 6.0Andrew ButtnerChristine WalzerINTERIMACCEPTEDCross-site scripting vulnerability in Internet Explorer 6.0 allows remote attackers to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.CVE-2002-0189ACCEPTED4Microsoft Windows 2000Distributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.CVE-2003-0715ACCEPTED2Microsoft Windows 2000Internet Information Server 5.0Andrew ButtnerACCEPTEDBuffer overflow in the ASP data transfer mechanism in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to cause a denial of service or execute code, aka "Microsoft-discovered variant of Chunked Encoding buffer overrun."CVE-2002-0147ACCEPTED4Microsoft Windows 2000Internet Explorer 5.5 or Internet Explorer 5.5 Service Pack 1David ProulxInternet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.CVE-2002-0026ACCEPTED3Microsoft Windows NTFTPTiffany BergeronThe FTP service in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows attackers who have established an FTP session to cause a denial of service via a specially crafted status request containing glob characters.CVE-2002-0073ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDBuffer overflow in the chunked encoding transfer mechanism in Internet Information Server (IIS) 4.0 and 5.0 Active Server Pages allows attackers to cause a denial of service or execute arbitrary code.CVE-2002-0079ACCEPTED3Microsoft Windows 2000Network Connection Manager (NCM)Christine WalzerChristine WalzerINTERIMACCEPTEDA handler routine for the Network Connection Manager (NCM) in Windows 2000 allows local users to gain privileges via a complex attack that causes the handler to run in the LocalSystem context with user-specified code.CVE-2002-0720ACCEPTED2Microsoft Windows 2000Internet Explorer 5.01Tiffany BergeronChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability.CVE-2002-0193ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDBuffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."CVE-2002-0364ACCEPTED4Microsoft Windows 2000SMTPTiffany BergeronAndrew ButtnerSMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 to cause a denial of service via a command with a malformed data transfer (BDAT) request.CVE-2002-0055ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0David ProulxChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.CVE-2002-0026ACCEPTED4Microsoft Windows 2000FTPTiffany BergeronThe FTP service in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows attackers who have established an FTP session to cause a denial of service via a specially crafted status request containing glob characters.CVE-2002-0073ACCEPTED4Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronDirectory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.CVE-2001-0333ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronChristine WalzerINTERIMACCEPTEDWindows 2000 allows local users to prevent the application of new group policy settings by opening Group Policy files with exclusive-read access.CVE-2002-0051ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDBuffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values.CVE-2002-0150ACCEPTED3Microsoft Windows 2000Internet Explorer 5.5 Service Pack 2David ProulxInternet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.CVE-2002-0023ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronIIS 4.0 and 5.0 allows remote attackers to read documents outside of the web root, and possibly execute arbitrary commands, via malformed URLs that contain UNICODE encoded characters, aka the "Web Server Folder Traversal" vulnerability.CVE-2000-0884ACCEPTED2Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in the ism.dll ISAPI extension that implements HTR scripting in Internet Information Server (IIS) 4.0 and 5.0 allows attackers to cause a denial of service or execute arbitrary code via HTR requests with long variable names.CVE-2002-0071ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronCross-site scripting vulnerability in Help File search facility for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to embed scripts into another user's session.CVE-2002-0074ACCEPTED2Microsoft Windows 2000Internet Explorer 5.01David ProulxMicrosoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box."CVE-2003-1326ACCEPTED2Microsoft Windows 2000Internet Explorer 5.01, Internet Explorer 5.01 Service Pack 1, or Internet Explorer 5.01 Service Pack 2David ProulxInternet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.CVE-2002-0023ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0David ProulxChristine WalzerINTERIMACCEPTEDThe showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote attackers to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with ShowHelp functionality."CVE-2003-1328ACCEPTED3Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronCross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.CVE-2002-0075ACCEPTED1Microsoft Windows 2000Remote Procedure Call (RPC)Tiffany BergeronChristine WalzerINTERIMACCEPTEDThe RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference.CVE-2002-1561ACCEPTED2Microsoft Windows NTRemote Access Service (RAS)Tiffany BergeronBuffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.CVE-2002-0366ACCEPTED1Microsoft Windows 2000Remote Access Service (RAS)Tiffany BergeronBuffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.CVE-2002-0366ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronTiffany BergeronACCEPTEDINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDIn Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which could allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain.CVE-2002-0018ACCEPTED4Microsoft Windows 2000Internet Information Server 5.0David ProulxChristine WalzerINTERIMACCEPTEDCross-site scripting vulnerability (XSS) in the ASP function responsible for redirection in Microsoft Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to embed a URL containing script in a redirection message.CVE-2003-0223ACCEPTED2Microsoft Windows 2000Microsoft SQL Server 2000Yi-Fang KohACCEPTEDJonathan BakerJonathan BakerINTERIMACCEPTEDAn SQL query method in Microsoft SQL Server 2000 Gold and 7.0 using Mixed Mode allows local database users to gain privileges by reusing a cached connection of the sa administrator account.CVE-2001-0344ACCEPTED2Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in the ASP data transfer mechanism in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to cause a denial of service or execute code, aka "Microsoft-discovered variant of Chunked Encoding buffer overrun."CVE-2002-0147ACCEPTED3Microsoft Windows 2000Windows 2000Tiffany Bergeronsmss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.CVE-2002-0367ACCEPTED2Microsoft Windows 2000Internet Explorer 5.5 or Internet Explorer 5.5 Service Pack 1David ProulxInternet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.CVE-2002-0023ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronTiffany BergeronACCEPTEDINTERIMACCEPTEDDirectory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.CVE-2001-0333ACCEPTED3Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronCross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other users via an HTTP error page.CVE-2002-0148ACCEPTED1Microsoft Windows 2000Microsoft SQL Server 2000Tiffany BergeronJonathan BakerINTERIMIngrid SkoogACCEPTEDChristine WalzerINTERIMACCEPTEDVulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.CVE-2001-0509ACCEPTED3Microsoft Windows 2000Microsoft SQL ServerYi-Fang KohIngrid SkoogINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflows in Microsoft SQL Server 7.0 and 2000 allow attackers with access to SQL Server to execute arbitrary code through the functions (1) raiserror, (2) formatmessage, or (3) xp_sprintf. NOTE: the C runtime format string vulnerability reported in MS01-060 is identified by CVE-2001-0879.CVE-2001-0542ACCEPTED3Microsoft Windows NTSimple Network Management Protocol (SNMP)Harvey RubinovitzVulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.CVE-2002-0013ACCEPTED1Microsoft Windows 2000Multiple UNC Provider (MUP)Tiffany BergeronBuffer overflow in Multiple UNC Provider (MUP) in Microsoft Windows operating systems allows local users to cause a denial of service or possibly gain SYSTEM privileges via a long UNC request.CVE-2002-0151ACCEPTED2Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronINTERIMIngrid SkoogACCEPTEDIIS 5.0 allows remote attackers to cause a denial of service via a series of malformed WebDAV requests.CVE-2001-0151ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Harvey RubinovitzCross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other users via an HTTP error page.CVE-2002-0148ACCEPTED1Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDBuffer overflow in ASP Server-Side Include Function in IIS 4.0, 5.0 and 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via long file names.CVE-2002-0149ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.CVE-2002-0078ACCEPTED5Microsoft Windows 2000Internet Explorer 6.0David ProulxChristine WalzerINTERIMACCEPTEDBuffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response.CVE-2002-0371ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0Andrew ButtnerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability.CVE-2002-0193ACCEPTED5Microsoft Windows NTLocator serviceTiffany BergeronBuffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.CVE-2003-0003ACCEPTED1Microsoft Windows 2000Windows 2000Tiffany BergeronBuffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.CVE-2003-0109ACCEPTED2Microsoft Windows 2000ISA Server 2000Tiffany BergeronACCEPTEDCross-site scripting (XSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to inject arbitrary web script via a URL containing the script in the domain name portion, which is not properly cleansed in the default error pages (1) 500.htm for "500 Internal Server error" or (2) 404.htm for "404 Not Found."CVE-2003-0526ACCEPTED1Microsoft Windows 2000SMB (Server Message Block)Tiffany BergeronACCEPTEDBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.CVE-2003-0345ACCEPTED1Microsoft Windows 2000SQL Server 2000Yi-Fang KohIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDBuffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote attackers to cause a denial of service or execute arbitrary code via a database query with certain long arguments.CVE-2002-0154ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronTiffany BergeronACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote attackers to execute arbitrary code via an HTML e-mail message or web page.CVE-2003-0809ACCEPTED2Microsoft Windows 2000Internet Explorer 6.0Andrew ButtnerChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box."CVE-2003-1326ACCEPTED3Microsoft Windows 2000Remote Procedure Call (RPC)Tiffany BergeronACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715.CVE-2003-0528ACCEPTED1Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDBuffer overflow in the ism.dll ISAPI extension that implements HTR scripting in Internet Information Server (IIS) 4.0 and 5.0 allows attackers to cause a denial of service or execute arbitrary code via HTR requests with long variable names.CVE-2002-0071ACCEPTED3Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in ASP Server-Side Include Function in IIS 4.0, 5.0 and 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via long file names.CVE-2002-0149ACCEPTED3Microsoft Windows 2000Windows Script Engine for JscriptDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack.CVE-2003-0010ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Virtual Machine (VM)Tiffany BergeronINTERIMACCEPTEDThe ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise."CVE-2003-0111ACCEPTED1Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values.CVE-2002-0150ACCEPTED3Microsoft Windows NTSimple Network Management Protocol (SNMP)Matt BusbyINTERIMACCEPTEDThe default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vulnerabilities.CVE-2001-0046ACCEPTED1Microsoft Windows NTMicrosoft Transaction Server (MTS)Matt BusbyINTERIMACCEPTEDThe default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.CVE-2001-0047ACCEPTED1Microsoft Windows 2000Internet Explorer 5.01, Internet Explorer 5.01 Service Pack 1Tiffany BergeronAndrew ButtnerACCEPTEDHTML e-mail feature in Internet Explorer 5.5 and earlier allows attackers to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly.CVE-2001-0154ACCEPTED2Microsoft Windows NTWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED2Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote attacker to steal potentially sensitive information from a user by redirecting the user to another site that has that information, aka "Encoded Characters Information Disclosure."CVE-2002-1186ACCEPTED2Microsoft Windows 2000Simple Network Management Protocol (SNMP)Harvey RubinovitzVulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.CVE-2002-0012ACCEPTED1Microsoft Windows NTMultiple UNC Provider (MUP)Tiffany BergeronBuffer overflow in Multiple UNC Provider (MUP) in Microsoft Windows operating systems allows local users to cause a denial of service or possibly gain SYSTEM privileges via a long UNC request.CVE-2002-0151ACCEPTED1Microsoft Windows NTSMB (Server Message Block)Christine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.CVE-2003-0345ACCEPTED2Microsoft Windows 2000Windows ShellChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.CVE-2002-0070ACCEPTED2Microsoft Windows NTWindows NT 4.0Tiffany Bergeronsmss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.CVE-2002-0367ACCEPTED1Microsoft Windows NTWindows NT 4.0Tiffany BergeronIn Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which could allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain.CVE-2002-0018ACCEPTED1Microsoft Windows NTSimple Network Management Protocol (SNMP)Harvey RubinovitzVulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.CVE-2002-0012ACCEPTED1Microsoft Windows Server 2003Microsoft Outlook ExpressIngrid SkoogDRAFTINTERIMACCEPTEDStack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.CVE-2005-1213ACCEPTED1Microsoft Windows 2000Internet Explorer 5.5Andrew ButtnerMicrosoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box."CVE-2003-1326ACCEPTED2Microsoft Windows NTInternet Information Server 4.0Tiffany BergeronACCEPTEDBuffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."CVE-2002-0364ACCEPTED3Microsoft Windows XPAuthenticodeTiffany BergeronAndrew ButtnerAndrew ButtnerACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDThe Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers execute arbitrary code without user approval.CVE-2003-0660ACCEPTED2Microsoft Windows 2000Microsoft Word 2000Christine WalzerChristine WalzerChristine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document.CVE-2003-0664ACCEPTED2Microsoft Windows 2000SMB (Server Message Block)Christine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".CVE-2002-0724ACCEPTED2Microsoft Windows 2000Certificate Enrollment ControlChristine WalzerACCEPTEDChristine WalzerINTERIMACCEPTEDUnknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows 98 Second Edition, Windows Millennium, Windows NT 4.0, Windows 2000, and Windows XP allow remote attackers to delete digital certificates on a user's system via HTML.CVE-2002-0699ACCEPTED2Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronIIS 5.0 allows remote attackers to execute arbitrary commands via a malformed request for an executable file whose name is appended with operating system commands, aka the "Web Server File Request Parsing" vulnerability.CVE-2000-0886ACCEPTED3Microsoft Windows NTRemote Procedure Call (RPC)Christine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.CVE-2003-0352ACCEPTED3Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronTiffany BergeronACCEPTEDBuffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.CVE-2001-0500ACCEPTED3Microsoft Windows 2000Windows 2000Tiffany BergeronTiffany BergeronACCEPTEDThe Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers execute arbitrary code without user approval.CVE-2003-0660ACCEPTED1Microsoft Windows 2000Remote Data Protocol (RDP)Tiffany BergeronChristine WalzerINTERIMACCEPTEDRemote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."CVE-2002-0863ACCEPTED3Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPWindows Script Engine for JScript v5.6Tiffany BergeronDavid ProulxDavid ProulxACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDInteger overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack.CVE-2003-0010ACCEPTED3Microsoft Windows XPWindows XPTiffany BergeronAndrew ButtnerACCEPTEDChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMINTERIMACCEPTEDBuffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.CVE-2003-0659ACCEPTED3Microsoft Windows 2000Microsoft Word 2000Ingrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word and Excel allow remote attackers to steal sensitive information via certain field codes that insert the information when the document is returned to the attacker, as demonstrated in Word using (1) INCLUDETEXT or (2) INCLUDEPICTURE, aka "Flaw in Word Fields and Excel External Updates Could Lead to Information Disclosure."CVE-2002-1143ACCEPTED2Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDCross-site scripting vulnerability (XSS) in Internet Explorer 5.01 through 6.0 allows remote attackers to read and execute files on the local system via web pages using the <frame> or <iframe> element and javascript, aka "Frames Cross Site Scripting," as demonstrated using the PrivacyPolicy.dlg resource.CVE-2002-1187ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronAndrew ButtnerACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).CVE-2003-0838ACCEPTED2Microsoft Windows 2000Microsoft Word 2000Ingrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to.CVE-2002-1056ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerDRAFTINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Tiffany BergeronDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.CVE-2004-0549ACCEPTED3Microsoft Windows 2000Simple Network Management Protocol (SNMP)Tiffany BergeronBuffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request. NOTE: this candidate may be split or merged with other candidates. This and other PROTOS-related candidates, especially CVE-2002-0012 and CVE-2002-0013, will be updated when more accurate information is available.CVE-2002-0053ACCEPTED1Microsoft Windows 2000Internet Information Server 5.0Harvey RubinovitzCross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.CVE-2002-0075ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerDRAFTINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED1Microsoft Windows 2000Messenger ServiceChristine WalzerACCEPTEDAndrew ButtnerACCEPTEDThe Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0717ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Ingrid SkoogDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.CVE-2004-0566ACCEPTED2Microsoft Windows 2000Help and Support Center (HSC)Christine WalzerACCEPTEDChristine WalzerINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDStack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.CVE-2003-0711ACCEPTED3Microsoft Windows NTDirectXChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMultiple integer overflows in a Microsoft Windows DirectX MIDI library (QUARTZ.DLL) allow remote attackers to execute arbitrary code via a MIDI (.mid) file with (1) large length for a Text or Copyright string, or (2) a large number of tracks, which leads to a heap-based buffer overflow.CVE-2003-0346ACCEPTED2Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDCross-site scripting vulnerability (XSS) in Internet Explorer 5.01 through 6.0 allows remote attackers to read and execute files on the local system via web pages using the <frame> or <iframe> element and javascript, aka "Frames Cross Site Scripting," as demonstrated using the PrivacyPolicy.dlg resource.CVE-2002-1187ACCEPTED1Microsoft Windows 2000Microsoft SQL ServerTiffany BergeronIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMIngrid SkoogACCEPTEDChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDThe xp_displayparamstmt function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.CVE-2000-1081ACCEPTED3Microsoft Windows 2000SQL Server 2000Yi-Fang KohJonathan BakerINTERIMACCEPTEDINTERIMIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDMicrosoft SQL Server 7, 2000, and MSDE allows local users go gain privileges by hijacking a named pipe during the authentication of another user, aka the "Named Pipe Hijacking" vulnerability.CVE-2003-0230ACCEPTED4Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronAndrew ButtnerACCEPTEDBuffer overflow in Troubleshooter ActiveX Control (Tshoot.ocx) in Microsoft Windows 2000 SP4 and earlier allows remote attackers to execute arbitrary code via an HTML document with a long argument to the RunQuery2 method.CVE-2003-0662ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Tiffany BergeronDRAFTINTERIMACCEPTEDThe WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.CVE-2004-0549ACCEPTED1Microsoft Windows Server 2003Network News Transport Protocol (NNTP)Christine WalzerDRAFTINTERIMACCEPTEDThe Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.CVE-2004-0574ACCEPTED1Microsoft Windows 2000Windows 2000Yi-Fang KohFormat string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.CVE-2001-0879ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDBuffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.CVE-2005-1211ACCEPTED1Microsoft Windows Server 2003SMB (Server Message Block)Jonathan BakerDRAFTINTERIMACCEPTEDBuffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."CVE-2005-1206ACCEPTED1Microsoft Windows 2000Windows kernelChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.CVE-2003-0715ACCEPTED1Microsoft Windows XPClient Server Runtime System (CSRSS)Ingrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDStack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value.CVE-2005-0551ACCEPTED1Microsoft Windows XPWindows XPTiffany BergeronAndrew ButtnerACCEPTEDChristine WalzerINTERIMACCEPTEDThe Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0717ACCEPTED2Microsoft Windows 2000Microsoft SQL Server 2000Yi-Fang KohIngrid SkoogIngrid SkoogINTERIMACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in SQL Server 7.0 and 2000 allows remote attackers to execute arbitrary code via a long OLE DB provider name to (1) OpenDataSource or (2) OpenRowset in an ad hoc connection.CVE-2002-0056ACCEPTED3Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDCross-Frame scripting vulnerability in the WebBrowser control as used in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code, read arbitrary files, or conduct other unauthorized activities via script that accesses the Document property, which bypasses <frame> and <iframe> domain restrictions.CVE-2002-1217ACCEPTED2Microsoft Windows 2000SMB Signing (Server Message Block)Christine WalzerACCEPTEDChristine WalzerINTERIMACCEPTEDThe SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.CVE-2002-1256ACCEPTED2Microsoft Windows XPWindows Media Player for Windows XPTiffany BergeronACCEPTEDMicrosoft Windows Media Player versions 6.4 and 7.1 and Media Player for Windows XP allow remote attackers to bypass Internet Explorer's (IE) security mechanisms and run code via an executable .wma media file with a license installation requirement stored in the IE cache, aka the "Cache Path Disclosure via Windows Media Player".CVE-2002-0372ACCEPTED1Microsoft Windows XPWindows Media Player for Windows XPTiffany BergeronACCEPTEDBuffer overflow in Microsoft Windows Media Player 6.4 allows remote attackers to execute arbitrary code via a malformed Advanced Streaming Format (ASF) file.CVE-2001-0719ACCEPTED1Microsoft Windows 2000SQL Server 2000Yi-Fang KohIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDBuffer overflow in the password encryption function of Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, allows remote attackers to gain control of the database and execute arbitrary code via SQL Server Authentication, aka "Unchecked Buffer in Password Encryption Procedure."CVE-2002-0624ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000MDAC 2.6Ingrid SkoogDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDHeap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.CVE-2002-1142ACCEPTED2Microsoft Windows 2000Remote Procedure Call (RPC)Tiffany BergeronACCEPTEDBuffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.CVE-2003-0352ACCEPTED1Microsoft Windows 2000Simple Network Management Protocol (SNMP)Harvey RubinovitzHarvey RubinovitzINTERIMACCEPTEDVulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.CVE-2002-0013ACCEPTED2Microsoft Windows 2000SQL Server 2000Yi-Fang KohJonathan BakerINTERIMACCEPTEDIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDMicrosoft SQL Server 7, 2000, and MSDE allows local or remote authenticated users to cause a denial of service (crash or hang) via a long request to a named pipe.CVE-2003-0231ACCEPTED4Microsoft Windows 2000SQL Server 2000Yi-Fang KohJonathan BakerINTERIMACCEPTEDIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDMicrosoft SQL Server 7, 2000, and MSDE allows local users to execute arbitrary code via a certain request to the Local Procedure Calls (LPC) port that leads to a buffer overflow.CVE-2003-0232ACCEPTED4Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Ingrid SkoogDRAFTINTERIMACCEPTEDInteger overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.CVE-2004-0566ACCEPTED1Microsoft Windows 2000Microsoft FrontPage Server Extensions 2000Tiffany BergeronTiffany BergeronINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDUnknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.CVE-2003-0824ACCEPTED2Microsoft Windows 2000SQL Server 2000Yi-Fang KohIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDBuffer overflow in bulk insert procedure of Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, allows attackers with database administration privileges to execute arbitrary code via a long filename in the BULK INSERT query.CVE-2002-0641ACCEPTED2Microsoft Windows NTWindows NT 4.0Tiffany BergeronINTERIMACCEPTEDThe getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method.CVE-2003-0525ACCEPTED2Microsoft Windows XPWindows Media Player for Windows XPTiffany BergeronACCEPTEDDirectory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location.CVE-2003-0228ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Ingrid SkoogDRAFTINTERIMACCEPTEDInteger overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.CVE-2004-0566ACCEPTED1Microsoft Windows XPMicrosoft Color Management ModuleChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the Microsoft Color Management Module for Windows allows remote attackers to execute arbitrary code via an image with crafted ICC profile format tags.CVE-2005-1219ACCEPTED1Microsoft Windows XPMicrosoft Windows Workstation ServiceAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDStack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.CVE-2003-0812ACCEPTED2Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDCross-Frame scripting vulnerability in the WebBrowser control as used in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code, read arbitrary files, or conduct other unauthorized activities via script that accesses the Document property, which bypasses <frame> and <iframe> domain restrictions.CVE-2002-1217ACCEPTED1Microsoft Windows 2000Network News Transport Protocol (NNTP)Christine WalzerACCEPTEDMemory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.CVE-2001-0543ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2000Christine WalzerACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0820ACCEPTED2Microsoft Windows 2000Windows 2000Tiffany BergeronACCEPTEDChristine WalzerINTERIMACCEPTEDINTERIMChristine WalzerINTERIMACCEPTEDBuffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.CVE-2003-0659ACCEPTED3Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED1Microsoft Windows XPMicrosoft FrontPage Server Extensions 2000Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.CVE-2003-0822ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft FrontPage Server Extensions 2002Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.CVE-2003-0822ACCEPTED2Microsoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft SharePoint Team ServicesAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.CVE-2003-0822ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED1Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronChristine WalzerINTERIMACCEPTEDThe ASP function Response.AddHeader in Microsoft Internet Information Server (IIS) 4.0 and 5.0 does not limit memory requests when constructing headers, which allow remote attackers to generate a large header to cause a denial of service (memory consumption) with an ASP page.CVE-2003-0225ACCEPTED2Microsoft Windows 2000HTML Help ActiveX ControlChristine WalzerAndrew ButtnerACCEPTEDBuffer overflow in the HTML Help ActiveX Control (hhctrl.ocx) in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute code via (1) a long parameter to the Alink function, or (2) script containing a long argument to the showHelp function.CVE-2002-0693ACCEPTED1Microsoft Windows Server 2003HTML Help FacilityAndrew ButtnerDRAFTINTERIMACCEPTEDInteger overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.CVE-2005-1208ACCEPTED1Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model and access information on the local system or in other domains, and possibly execute code, via cached methods and objects, aka "Cross Domain Verification via Cached Methods."CVE-2002-1254ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".CVE-2005-1988ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Tiffany BergeronAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.CVE-2003-0814ACCEPTED2Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6.0 does not properly check certain parameters of a PNG file when opening it, which allows remote attackers to cause a denial of service (crash) by triggering a heap-based buffer overflow using invalid length codes during decompression, aka "Malformed PNG Image File Failure."CVE-2002-1185ACCEPTED2Microsoft Windows NTSimple Network Management Protocol (SNMP)Matt BusbyMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request. NOTE: this candidate may be split or merged with other candidates. This and other PROTOS-related candidates, especially CVE-2002-0012 and CVE-2002-0013, will be updated when more accurate information is available.CVE-2002-0053ACCEPTED1Microsoft Windows 2000HTML Help FacilityChristine WalzerACCEPTEDChristine WalzerINTERIMACCEPTEDThe HTML Help facility in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP uses the Local Computer Security Zone when opening .chm files from the Temporary Internet Files folder, which allows remote attackers to execute arbitrary code via HTML mail that references or inserts a malicious .chm file containing shortcuts that can be executed, aka "Code Execution via Compiled HTML Help File."CVE-2002-0694ACCEPTED2Microsoft Windows 2000ISA Server 2000Tiffany BergeronACCEPTEDThe Winsock Proxy service in Microsoft Proxy Server 2.0 and the Microsoft Firewall service in Internet Security and Acceleration (ISA) Server 2000 allow remote attackers to cause a denial of service (CPU consumption or packet storm) via a spoofed, malformed packet to UDP port 1745.CVE-2003-0110ACCEPTED0Microsoft Windows Server 2003Windows ShellHarvey RubinovitzDRAFTINTERIMACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDInternet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model and access information on the local system or in other domains, and possibly execute code, via cached methods and objects, aka "Cross Domain Verification via Cached Methods."CVE-2002-1254ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.CVE-2004-0963ACCEPTED1Microsoft Windows 2000Telnet protocolChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in telnet server in Windows 2000 and Interix 2.2 allows remote attackers to execute arbitrary code via malformed protocol options.CVE-2002-0020ACCEPTED2Microsoft Windows 2000Microsoft Word 2002Ingrid SkoogDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMicrosoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to.CVE-2002-1056ACCEPTED2Microsoft Windows XPMicrosoft Color Management ModuleChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the Microsoft Color Management Module for Windows allows remote attackers to execute arbitrary code via an image with crafted ICC profile format tags.CVE-2005-1219ACCEPTED1Microsoft Windows 2000Internet Explorer 6.0Harvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading."CVE-2002-1188ACCEPTED2Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED1Microsoft Windows 2000Utilities Manager/Windows MessagingChristine WalzerACCEPTEDChristine WalzerINTERIMACCEPTEDThe control for listing accessibility options in the Accessibility Utility Manager on Windows 2000 (ListView) does not properly handle Windows messages, which allows local users to execute arbitrary code via a "Shatter" style message to the Utility Manager that references a user-controlled callback function.CVE-2003-0350ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED2Microsoft Windows 2000HTML Help FacilityAndrew ButtnerDRAFTINTERIMACCEPTEDInteger overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.CVE-2005-1208ACCEPTED1Microsoft Windows 2000Small Business Server 2000Jonathan BakerDRAFTINTERIMACCEPTEDBuffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."CVE-2005-1206ACCEPTED1Microsoft Windows 2000ISA Server 2000Christine WalzerDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMicrosoft ISA Server 2000 allows remote attackers to connect to services utilizing the NetBIOS protocol via a NetBIOS connection with an ISA Server that uses the NetBIOS (all) predefined packet filter.CVE-2005-1216ACCEPTED2Microsoft Windows 2000Internet Explorer 5.01Harvey RubinovitzACCEPTEDInternet Explorer 5.01 through 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote attacker to steal potentially sensitive information from a user by redirecting the user to another site that has that information, aka "Encoded Characters Information Disclosure."CVE-2002-1186ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Tiffany BergeronAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.CVE-2003-0815ACCEPTED2Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Andrew ButtnerINTERIMACCEPTEDMicrosoft Exchange 2003 and Outlook Web Access (OWA), when configured to use NTLM authentication, does not properly reuse HTTP connections, which can cause OWA users to view mailboxes of other users when Kerberos has been disabled as an authentication method for IIS 6.0, e.g. when SharePoint Services 2.0 is installed.CVE-2003-0904ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Internet Security and Acceleration Server 2000David ProulxINTERIMACCEPTEDBuffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.CVE-2003-0819ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Microsoft Internet Explorer 6 Service Pack 1Tiffany BergeronAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.CVE-2003-0816ACCEPTED2Microsoft Windows 2000Internet Information Server 5.0Tiffany BergeronACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in ssinc.dll for Microsoft Internet Information Services (IIS) 5.0 allows local users to execute arbitrary code via a web page with a Server Side Include (SSI) directive with a long filename, aka "Server Side Include Web Pages Buffer Overrun."CVE-2003-0224ACCEPTED2Microsoft Windows 2000Microsoft SQL Server 2000Matthew BurtonMatthew BurtonMatthew BurtonDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension."CVE-2002-0186ACCEPTED2Microsoft Windows 2000Microsoft SQL Server 2000Matthew BurtonMatthew BurtonDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension."CVE-2002-0186ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED2Microsoft Windows 2000Remote Procedure Call (RPC)Tiffany BergeronACCEPTEDThe RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.CVE-2003-0605ACCEPTED1Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDInternet Explorer 5.01 through 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote attacker to steal potentially sensitive information from a user by redirecting the user to another site that has that information, aka "Encoded Characters Information Disclosure."CVE-2002-1186ACCEPTED1Microsoft Windows NTRemote Access Service (RAS)Matt BusbyINTERIMACCEPTEDThe default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.CVE-2001-0045ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Ingrid SkoogDRAFTINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDInteger overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.CVE-2004-0566ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Ingrid SkoogDRAFTINTERIMACCEPTEDInteger overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.CVE-2004-0566ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED3Microsoft Windows XPMicrosoft Internet Explorer 6Tiffany BergeronDRAFTINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDThe WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.CVE-2004-0549ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Data Access Compnents 2.5Christine WalzerINTERIMACCEPTEDBuffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.CVE-2003-0903ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."CVE-2003-1025ACCEPTED3Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED2Microsoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDInternet Explorer 5.01 through 6.0 does not properly check certain parameters of a PNG file when opening it, which allows remote attackers to cause a denial of service (crash) by triggering a heap-based buffer overflow using invalid length codes during decompression, aka "Malformed PNG Image File Failure."CVE-2002-1185ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Microsoft Internet Explorer 6 Service Pack 1Tiffany BergeronAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED1Microsoft Windows 2000MSDTCRobert L. HollisDRAFTINTERIMThe MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.CVE-2005-2119INTERIM1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Data Access Compnents 2.6Christine WalzerINTERIMACCEPTEDBuffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.CVE-2003-0903ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.CVE-2003-0817ACCEPTED2Microsoft Windows XPWindows ShellHarvey RubinovitzDRAFTINTERIMACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows 2000Microsoft Windows Workstation ServiceTiffany BergeronACCEPTEDStack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.CVE-2003-0812ACCEPTED1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Virtual Machine (VM)Tiffany BergeronINTERIMACCEPTEDTwo vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error.CVE-2002-1258ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 97Andrew ButtnerINTERIMACCEPTEDIngrid SkoogINTERIMIngrid SkoogMicrosoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0820INTERIM1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 98Andrew ButtnerINTERIMACCEPTEDMicrosoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0820ACCEPTED1Microsoft Windows Server 2003Windows ShellHarvey RubinovitzDRAFTINTERIMACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED2Microsoft Windows NTMicrosoft FrontPage Server Extensions 2000Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDUnknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.CVE-2003-0824ACCEPTED2Microsoft Windows 2000Microsoft Windows XPMSN MessengerChristine WalzerDRAFTINTERIMACCEPTEDMultiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.CVE-2004-0597ACCEPTED1Microsoft Windows Server 2003Services for UNIXJonathan BakerDRAFTINTERIMACCEPTEDThe Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote attackers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.CVE-2005-1205ACCEPTED1Microsoft Windows XPMicrosoft FrontPage Server Extensions 2000Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDUnknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.CVE-2003-0824ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDThe legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.CVE-2002-0648ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft FrontPage Server Extensions 2002Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMUnknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.CVE-2003-0824INTERIM1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."CVE-2003-1027ACCEPTED3Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 2Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Excel 2000Christine WalzerACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.CVE-2003-0821ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED2Microsoft Windows NTMDAC 2.8Ingrid SkoogDRAFTINTERIMACCEPTEDThe License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbtirary code, aka the "License Logging Service Vulnerability."CVE-2005-0050ACCEPTED1Microsoft Windows 2000Microsoft ASN.1 LibraryAndrew ButtnerINTERIMACCEPTEDMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.CVE-2003-0818ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2002Andrew ButtnerINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2003-0820ACCEPTED2Microsoft Windows XPMicrosoft Windows Server 2003Operating SystemRobert L. HollisDRAFTA remote Denial of Service vulnerability exists for the rendering of Enhanced Metafile (EMF) images. A EMF image is a 32-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to trigger a program crash on the affected system. This action would not result in an opportunity to execute code or elevate privileges. A successful attack would cause a program to stop responding. The user may need to manually kill the process using the Windows Task Manager. Once restarted, the program should operate normally until another attempt is made to open the offending image file.CAN-2005-0803DRAFT1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Excel 97Andrew ButtnerINTERIMACCEPTEDIngrid SkoogINTERIMMicrosoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.CVE-2003-0821INTERIM1Microsoft Windows NTNetDDE AgentIngrid SkoogDRAFTINTERIMACCEPTEDNetDDE Agent on Windows NT 4.0, 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code as LocalSystem via "shatter" style attack by sending a WM_COPYDATA message followed by a WM_TIMER message, as demonstrated by GetAd, aka "Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation."CVE-2002-1230ACCEPTED1Microsoft Windows 2000Microsoft AgentHarvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDMicrosoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.CVE-2005-1214ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDReview blocked recipient list1.2.7ACCEPTED1Corresponds to item 1.2.7 in the Exchange 2003 BenchmarkMicrosoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMJonathan BakerIngrid SkoogACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED1Microsoft Windows Server 2003TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED2Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDReview the global accept and deny lists.1.2.1ACCEPTED1Corresponds to item 1.2.1 in the Exchange 2003 BenchmarkMicrosoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED1Microsoft Windows 2000Internet Explorer 5.5Harvey RubinovitzACCEPTEDInternet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading."CVE-2002-1188ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Excel 2002Andrew ButtnerINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.CVE-2003-0821ACCEPTED2Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED1Microsoft Windows NTMicrosoft FrontPage Server Extensions 2000Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.CVE-2003-0822ACCEPTED2Microsoft Windows XPMicrosoft Windows Server 2003Operating SystemRobert L. HollisDRAFTA remote code execution vulnerability exists for the rendering of Windows Metafile (WMF) images. A WMF image is a 16-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to remotely execute arbitrary code on the target system. This action could allow the attacker to install programs, access and alter data, and escalate privileges. A successful attack would thus grant a remote attacker complete control of the affected system.CAN-2005-2123DRAFT1Microsoft Windows 2000Windows Internet Naming Service (WINS)Andrew ButtnerINTERIMACCEPTEDThe Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.CVE-2003-0825ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."CVE-2005-0055ACCEPTED1Microsoft Windows NTWindows Animated CursorChristine WalzerDRAFTINTERIMACCEPTEDThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.CVE-2004-1305ACCEPTED1Microsoft Windows 2000Hyperlink Object LibraryChristine WalzerDRAFTINTERIMACCEPTEDThe Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow.CVE-2005-0057ACCEPTED1Microsoft Windows Server 2003Web Client ServiceMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in the Web Client service in Microsoft Windows XP and Windows Server 2003 allows remote authenticated users to execute arbitrary code via a crafted WebDAV request containing special parameters.CVE-2005-1207ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Microsoft Internet Explorer 6 Service Pack 1Tiffany BergeronAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.CVE-2003-0823ACCEPTED2Microsoft Windows 2000Microsoft FrontPage Server Extensions 2000Tiffany BergeronAndrew ButtnerINTERIMACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.CVE-2003-0822ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Data Access Compnents 2.7Christine WalzerINTERIMACCEPTEDBuffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.CVE-2003-0903ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft SharePoint Team ServicesAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMUnknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.CVE-2003-0824INTERIM1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDReview whether anonymous HTTP access is allowed2.1.2ACCEPTED1Corresponds to item 2.1.2 in the Exchange 2003 BenchmarkMicrosoft Windows Server 2003Microsoft Color Management ModuleChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the Microsoft Color Management Module for Windows allows remote attackers to execute arbitrary code via an image with crafted ICC profile format tags.CVE-2005-1219ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDBuffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.CVE-2005-1211ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Data Access Compnents 2.8Christine WalzerINTERIMACCEPTEDBuffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.CVE-2003-0903ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDThe legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.CVE-2002-0648ACCEPTED1Microsoft Windows 2000Client Server Runtime System (CSRSS)Ingrid SkoogDRAFTINTERIMChristine WalzerAndrew ButtnerACCEPTEDStack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value.CVE-2005-0551ACCEPTED1Microsoft Windows 2000Local Security Authority Subsystem Service (LSASS)Christine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED2Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED2Microsoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-1060ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6Harvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDBuffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.CVE-2005-1211ACCEPTED1Microsoft Windows 2000Services for UNIXJonathan BakerDRAFTINTERIMACCEPTEDThe Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote attackers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.CVE-2005-1205ACCEPTED1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMnetman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function.CVE-2005-2307INTERIM1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."CVE-2005-0554ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Windows Script Engine for JScript v5.1Tiffany BergeronDavid ProulxINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack.CVE-2003-0010ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Windows Script Engine for JScript v5.5Tiffany BergeronDavid ProulxINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack.CVE-2003-0010ACCEPTED2Microsoft Windows NTMicrosoft ASN.1 LibraryAndrew ButtnerINTERIMACCEPTEDMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.CVE-2003-0818ACCEPTED1Microsoft Windows XPMicrosoft ASN.1 LibraryAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.CVE-2003-0818ACCEPTED2Microsoft Windows Server 2003Microsoft ASN.1 LibraryAndrew ButtnerINTERIMACCEPTEDMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.CVE-2003-0818ACCEPTED1Microsoft Windows NTWindows Internet Naming Service (WINS)Andrew ButtnerINTERIMACCEPTEDThe Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.CVE-2003-0825ACCEPTED1Microsoft Windows NTWindows Internet Naming Service (WINS)Andrew ButtnerINTERIMACCEPTEDThe Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.CVE-2003-0825ACCEPTED1Microsoft Windows Server 2003Windows Internet Naming Service (WINS)Andrew ButtnerINTERIMACCEPTEDThe Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.CVE-2003-0825ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Andrew ButtnerAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."CVE-2003-1026ACCEPTED3Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows 2000Windows Media ServicesTiffany BergeronINTERIMUnknown vulnerability in Windows Media Station Service and Windows Media Monitor Service components of Windows Media Services 4.1 allows remote attackers to cause a denial of service (disallowing new connections) via a certain sequence of TCP/IP packets.CVE-2003-0905INTERIM0Microsoft Windows 95Microsoft OutlookAndrew ButtnerINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDArgument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.CVE-2004-0121ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003MSN MessengerChristine WalzerINTERIMAndrew ButtnerACCEPTEDMicrosoft MSN Messenger 6.0 and 6.1 does not properly handle certain requests, which allows remote attackers to read arbitrary files.CVE-2004-0122ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Outlook ExpressAndrew ButtnerINTERIMACCEPTEDThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."CVE-2004-0380ACCEPTED1Microsoft Windows 2000Local Security Authority Subsystem Service (LSASS)Tiffany BergeronINTERIMACCEPTEDStack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.CVE-2003-0533ACCEPTED1Microsoft Windows Server 2003Secure Sockets Layer (SSL)David ProulxINTERIMACCEPTEDThe Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.CVE-2004-0120ACCEPTED1Microsoft Windows XPSecure Sockets Layer (SSL)David ProulxINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.CVE-2004-0120ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED1Microsoft Windows XPPrivate Communications Transport (PCT)Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.CVE-2003-0719ACCEPTED2Microsoft Windows 2000Local Descriptor Table (LDT)Jonathan BakerINTERIMACCEPTEDThe NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory.CVE-2003-0910ACCEPTED1Microsoft Windows 2000Secure Sockets Layer (SSL)David ProulxINTERIMACCEPTEDThe Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.CVE-2004-0120ACCEPTED1Microsoft Windows 2000Remote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDA multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.CVE-2003-0813ACCEPTED1Microsoft Windows Server 2003Remote Procedure Call (RPC)Christine WalzerA multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.CVE-2003-0813DRAFT0Microsoft Windows NTWindows logon process (winlogon)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.CVE-2003-0806ACCEPTED1Microsoft Windows 2000Windows logon process (winlogon)Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.CVE-2003-0806ACCEPTED2Microsoft Windows NTEnhanced Metafile (EMF)Windows Metafile (WMF)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.CVE-2003-0906ACCEPTED1Microsoft Windows XPLocal Security Authority Subsystem Service (LSASS)Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDStack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.CVE-2003-0533ACCEPTED2Microsoft Windows XPRemote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDA multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.CVE-2003-0813ACCEPTED1Microsoft Windows Server 2003COM Internet ServicesChristine WalzerChristine WalzerDRAFTINTERIMACCEPTEDWindows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."CVE-2005-0047ACCEPTED1Microsoft Windows NTPrivate Communications Transport (PCT)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.CVE-2003-0719ACCEPTED1Microsoft Windows Server 2003Help and Support Center (HSC)Harvey RubinovitzHarvey RubinovitzINTERIMACCEPTEDHelp and Support Center in Microsoft Windows XP SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code via quotation marks in an hcp:// URL, which are not quoted when constructing the argument list to HelpCtr.exe.CVE-2003-0907ACCEPTED1Microsoft Windows Server 2003Microsoft AgentHarvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDMicrosoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.CVE-2005-1214ACCEPTED1Microsoft Windows 2000H.323Jonathan BakerINTERIMACCEPTEDUnknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code.CVE-2004-0117ACCEPTED1Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDIIS 5.0 uses relative paths to find system files that will run in-process, which allows local users to gain privileges via a Trojan horse file, aka the "System file listing privilege elevation" vulnerability.CVE-2001-0507ACCEPTED1Microsoft Windows Server 2003NetWareRobert L. HollisDRAFTINTERIMThe Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.CVE-2005-1985INTERIM1Microsoft Windows NTLocal Descriptor Table (LDT)Jonathan BakerINTERIMACCEPTEDThe NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory.CVE-2003-0910ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDIIS 5.0 uses relative paths to find system files that will run in-process, which allows local users to gain privileges via a Trojan horse file, aka the "System file listing privilege elevation" vulnerability.CVE-2001-0507ACCEPTED2Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDIn IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.CVE-1999-0278ACCEPTED1Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDBuffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.CVE-1999-0874ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDIIS HTTP service uses Integrated Windows authentication.2.1.4ACCEPTED1Corresponds to item 2.1.4 in the Exchange 2003 BenchmarkMicrosoft Windows Server 2003Local Security Authority Subsystem Service (LSASS)Andrew ButtnerINTERIMACCEPTEDStack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.CVE-2003-0533ACCEPTED1Microsoft Windows 98Microsoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5, Internet Explorer 5.5 Service Pack 1Tiffany BergeronINTERIMACCEPTEDInternet Explorer 5.5 and earlier allows remote attackers to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.CVE-2001-0002ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."CVE-2001-0727ACCEPTED3Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDBuffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.CVE-2003-0344ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability.CVE-2002-0190ACCEPTED3Microsoft Windows Server 2003Microsoft ASN.1 LibraryDavid ProulxINTERIMACCEPTEDDouble-free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code.CVE-2004-0123ACCEPTED1Microsoft Windows 98Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.CVE-2002-0022ACCEPTED3Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Internet Explorer 5.5Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDBuffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute arbitrary code via an HTTP response containing long values in (1) Content-type and (2) Content-encoding fields.CVE-2003-0113ACCEPTED2Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDIIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability.CVE-2000-0778ACCEPTED1Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDUnknown vulnerability in the hosting process (dllhost.exe) for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allows remote attackers to gain privileges by executing an out of process application that acquires LocalSystem privileges, aka "Out of Process Privilege Elevation."CVE-2002-0869ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDUnknown vulnerability in the hosting process (dllhost.exe) for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allows remote attackers to gain privileges by executing an out of process application that acquires LocalSystem privileges, aka "Out of Process Privilege Elevation."CVE-2002-0869ACCEPTED2Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDA typographical error in the script source access permissions for Internet Information Server (IIS) 5.0 does not properly exclude .COM files, which allows attackers with only write permissions to upload malicious .COM files, aka "Script Source Access Vulnerability."CVE-2002-1180ACCEPTED2Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDThe showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.CVE-1999-0736ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Internet Information Services (IIS) 5.0 and 5.1 allows remote attackers to cause a denial of service via a long WebDAV request with a (1) PROPFIND or (2) SEARCH method, which generates an error condition that is not properly handled.CVE-2003-0226ACCEPTED2Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDReview block-list Exception list entries1.2.3ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDThe logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.CVE-2003-0227ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDBuffer overflow in the streaming media component for logging multicast requests in the ISAPI for the logging capability of Microsoft Windows Media Services (nsiislog.dll), as installed in IIS 5.0, allows remote attackers to execute arbitrary code via a large POST request to nsiislog.dll.CVE-2003-0349ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMultiple cross-site scripting (XSS) vulnerabilities in the administrative web pages for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allow remote attackers to execute HTML script as other users through (1) a certain ASP file in the IISHELP virtual directory, or (2) possibly other unknown attack vectors.CVE-2002-1181ACCEPTED2Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDMultiple cross-site scripting (XSS) vulnerabilities in the administrative web pages for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allow remote attackers to execute HTML script as other users through (1) a certain ASP file in the IISHELP virtual directory, or (2) possibly other unknown attack vectors.CVE-2002-1181ACCEPTED1Microsoft Windows Server 2003H.323Jonathan BakerINTERIMACCEPTEDUnknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code.CVE-2004-0117ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6.0 allows remote attackers to bypass security zone restrictions and execute arbitrary programs via a web document with a large number of duplicate file:// or other requests that point to the program and open multiple file download dialogs, which eventually cause Internet Explorer to execute the program, as demonstrated using a large number of FRAME or IFRAME tags, aka the "File Download Dialog Vulnerability."CVE-2003-0309ACCEPTED2Microsoft Windows 2000Private Communications Transport (PCT)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.CVE-2003-0719ACCEPTED1Microsoft Windows NTSNMPChristine WalzerINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDMemory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.CVE-1999-0815ACCEPTED2Microsoft Windows 2000Remote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDAn Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.CVE-2004-0116ACCEPTED1Microsoft Windows NTHTML Help FacilityAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.CVE-2003-1041ACCEPTED1Microsoft Windows Server 2003Remote Procedure Call (RPC)Christine WalzerChristine WalzerAn Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.CVE-2004-0116DRAFT0Microsoft Windows XPRemote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDAn Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.CVE-2004-0116ACCEPTED2Microsoft Windows 2000Enhanced Metafile (EMF)Windows Metafile (WMF)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.CVE-2003-0906ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000MDAC 2.5Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.CVE-2003-0353ACCEPTED2Microsoft Windows XPMicrosoft Data Access Components 2.6Christine WalzerINTERIMACCEPTEDBuffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.CVE-2003-0353ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Internet Explorer 5.5Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDThe file upload control in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to automatically upload files from the local system via a web page containing a script to upload the files.CVE-2003-0114ACCEPTED2Microsoft Windows XPH.323Jonathan BakerINTERIMACCEPTEDUnknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code.CVE-2004-0117ACCEPTED1Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDThe logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.CVE-2003-0227ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Jet Database EngineAndrew ButtnerINTERIMACCEPTEDBuffer overflow in Microsoft Jet Database Engine 4.0 allows remote attackers to execute arbitrary code via a specially-crafted database query.CVE-2004-0197ACCEPTED1Microsoft Windows NTCOM Internet ServicesChristine WalzerINTERIMACCEPTEDBuffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.CVE-2003-0807ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDChristine WalzerChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6.0 allows remote attackers to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vulnerability described in MS:MS01-058/CAN-2001-0874.CVE-2002-0027ACCEPTED3Microsoft Windows XPIIS 5.1Christine WalzerINTERIMACCEPTEDUnknown vulnerability in the hosting process (dllhost.exe) for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allows remote attackers to gain privileges by executing an out of process application that acquires LocalSystem privileges, aka "Out of Process Privilege Elevation."CVE-2002-0869ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Outlook ExpressIngrid SkoogDRAFTINTERIMACCEPTEDStack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.CVE-2005-1213ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Outlook ExpressAndrew ButtnerINTERIMACCEPTEDThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."CVE-2004-0380ACCEPTED1Microsoft Windows 2000COM Internet ServicesChristine WalzerINTERIMACCEPTEDBuffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.CVE-2003-0807ACCEPTED1Microsoft Windows 98File and Print SharingTiffany BergeronINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDFile and Print Sharing service in Windows 95, Windows 98, and Windows Me does not properly check the password for a file share, which allows remote attackers to bypass share access controls by sending a 1-byte password that matches the first character of the real password, aka the "Share Level Password" vulnerability.CVE-2000-0979ACCEPTED2Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDReview blocked sender list1.2.8ACCEPTED1Corresponds to item 1.2.8 in the Exchange 2003 BenchmarkMicrosoft Windows XPHelp and Support Center (HSC)Harvey RubinovitzHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDHelp and Support Center in Microsoft Windows XP SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code via quotation marks in an hcp:// URL, which are not quoted when constructing the argument list to HelpCtr.exe.CVE-2003-0907ACCEPTED2Microsoft Windows XPWindows XPHarvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDWindows XP allows local users to execute arbitrary programs by creating a task at an elevated privilege level through the eventtriggers.exe command-line tool or the Task Scheduler service, aka "Windows Management Vulnerability."CVE-2003-0909ACCEPTED2Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."CVE-2005-0055ACCEPTED1Microsoft Windows XPMicrosoft ASN.1 LibraryDavid ProulxINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDDouble-free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code.CVE-2004-0123ACCEPTED2Microsoft Windows XPHelp and Support Center (HSC)Harvey RubinovitzINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDHelp and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).CVE-2004-0199ACCEPTED2Microsoft Windows XPIIS 5.1Christine WalzerINTERIMACCEPTEDIIS 5.0 and 5.1 allows remote attackers to cause a denial of service (crash) via malformed WebDAV requests that cause a large amount of memory to be assigned.CVE-2002-1182ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Outlook ExpressAndrew ButtnerINTERIMACCEPTEDThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."CVE-2004-0380ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDIIS 5.0 and 5.1 allows remote attackers to cause a denial of service (crash) via malformed WebDAV requests that cause a large amount of memory to be assigned.CVE-2002-1182ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6.0 allows remote attackers to cause the File Download dialogue box to misrepresent the name of the file in the dialogue in a way that could fool users into thinking that the file type is safe to download.CVE-2001-0875ACCEPTED3Microsoft Windows XPInternet Explorer 5.01, Internet Explorer 5.01 Service Pack 1, or Internet Explorer 5.01 Service Pack 2Internet Explorer 5.5 Service Pack 2Internet Explorer 6.0Internet Explorer 5.5 or Internet Explorer 5.5 Service Pack 1Internet Explorer 6 SP1Matthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows 2000Lightweight Directory Access Protocol (LDAP)Tiffany BergeronINTERIMACCEPTEDUnknown vulnerability in the Local Security Authority Subsystem Service (LSASS) in Windows 2000 domain controllers allows remote attackers to cause a denial of service via a crafted LDAP message.CVE-2003-0663ACCEPTED1Microsoft Windows NTIIS 4.0Christine WalzerINTERIMACCEPTEDDirectory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.CVE-2001-0333ACCEPTED1Microsoft Windows NTMicrosoft Windows NTTiffany BergeronINTERIMACCEPTEDThe Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability.CVE-2000-0377ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Exchange 2000Tiffany BergeronINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.CVE-2002-0049ACCEPTED2Microsoft Windows NTMicrosoft Windows NTTiffany BergeronINTERIMACCEPTEDThe registry in Windows NT can be accessed remotely by users who are not administrators.CVE-1999-0562ACCEPTED1Microsoft Windows 2000NetBIOSTiffany BergeronINTERIMACCEPTEDA component service related to NETBIOS is running.CVE-1999-0621ACCEPTED1Microsoft Windows NTSQL Server 2000Tiffany BergeronINTERIMACCEPTEDJonathan BakerINTERIMINTERIMACCEPTEDIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDThe registry key containing the SQL Server service account information in Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, has insecure permissions, which allows local users to gain privileges, aka "Incorrect Permission on SQL Server Service Account Registry Key."CVE-2002-0642ACCEPTED3Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDThe legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.CVE-2002-0648ACCEPTED1Microsoft Windows 2000Microsoft DirectPlayTiffany BergeronINTERIMACCEPTEDIDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.CVE-2004-0202ACCEPTED1Microsoft Windows Server 2003Microsoft Outlook ExpressAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."CVE-2004-0380ACCEPTED2Microsoft Windows Server 2003COM Internet ServicesChristine WalzerINTERIMACCEPTEDBuffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.CVE-2003-0807ACCEPTED1Microsoft Windows Server 2003Help and Support Center (HSC)Harvey RubinovitzINTERIMACCEPTEDHelp and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).CVE-2004-0199ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Veritas Backup Exec 8.5Tiffany BergeronINTERIMIngrid SkoogVeritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.CVE-2002-1117INTERIM0Microsoft Windows XPMicrosoft Data Access Components 2.7Christine WalzerChristine WalzerINTERIMACCEPTEDBuffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.CVE-2003-0353ACCEPTED3Microsoft Windows NTRemote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDThe DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."CVE-2004-0124ACCEPTED1Microsoft Windows 2000Print Spooler ServiceMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message.CVE-2005-1984ACCEPTED1Microsoft Windows 2000Utility ManagerHarvey RubinovitzINTERIMACCEPTEDThe Utility Manager in Microsoft Windows 2000 executes winhlp32.exe with system privileges, which allows local users to execute arbitrary code via a "Shatter" style attack using a Windows message that accesses the context sensitive help button in the GUI, as demonstrated using the File Open dialog in the Help window, a different vulnerability than CVE-2004-0213.CVE-2003-0908ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDDirectory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.CVE-2001-0333ACCEPTED1Microsoft Windows XPCompressed FoldersDavid ProulxDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMatthew WojcikINTERIMACCEPTEDInteger overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.CVE-2004-0575ACCEPTED3Microsoft Windows XPWindows logon process (winlogon)Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.CVE-2003-0806ACCEPTED2Microsoft Windows XPCertGetCertificateChain, CertVerifyCertificateChainPolicy, and WinVerifyTrust APIsChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.CVE-2002-0862ACCEPTED2Microsoft Windows XPHTML Help FacilityAndrew ButtnerDRAFTINTERIMACCEPTEDInteger overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.CVE-2005-1208ACCEPTED1Microsoft Windows NTCertificate ValidationChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Windows 98 and Windows NT 4.0 do not properly verify the Basic Constraints of digital certificates, allowing remote attackers to execute code, aka "New Variant of Certificate Validation Flaw Could Enable Identity Spoofing" (CAN-2002-0862).CVE-2002-1183ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.CVE-2005-1990ACCEPTED1Microsoft Windows 2000Remote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDThe DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."CVE-2004-0124ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFT'A remote code execution vulnerability exists for the rendering of Windows Metafile (WMF) images. A WMF image is a 16-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to remotely execute arbitrary code on the target system. This action could allow the attacker to install programs, access and alter data, and escalate privileges. A successful attack would thus grant a remote attacker complete control of the affected system.'CAN-2005-2123DRAFT1Microsoft Windows XPEnhanced Metafile (EMF)Windows Metafile (WMF)Andrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.CVE-2003-0906ACCEPTED2Microsoft Windows Server 2003Remote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDThe DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."CVE-2004-0124ACCEPTED1Microsoft Windows 2000IIS 5.0Christine WalzerINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.CVE-2001-0241ACCEPTED2Microsoft Windows XPMSDTCRobert L. HollisDRAFTINTERIMThe MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.CVE-2005-2119INTERIM1Microsoft Windows XPRemote Procedure Call (RPC)Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."CVE-2004-0124ACCEPTED2Microsoft Windows XPTelephony ServiceAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft ASN.1 LibraryDavid ProulxINTERIMACCEPTEDDouble-free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code.CVE-2004-0123ACCEPTED1Microsoft Windows NTSQL Server 2000Tiffany BergeronINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDIngrid SkoogIngrid SkoogINTERIMACCEPTEDMultiple buffer overflows in SQL Server 2000 Resolution Service allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption.CVE-2002-0649ACCEPTED3Microsoft Windows 2000NetBIOSTiffany BergeronINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDInteractions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.CVE-2000-1079ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Outlook ExpressIngrid SkoogDRAFTINTERIMACCEPTEDStack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.CVE-2005-1213ACCEPTED1Microsoft Windows Server 2003Private Communications Transport (PCT)Andrew ButtnerINTERIMACCEPTEDBuffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.CVE-2003-0719ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Internet Explorer 5.5 Service Pack 2Tiffany BergeronINTERIMACCEPTEDINTERIMHarvey RubinovitzACCEPTEDHeap-based buffer overflow in plugin.ocx for Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute arbitrary code via the Load() method, a different vulnerability than CVE-2003-0115.CVE-2003-0233ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows 2000DirectXRobert L. HollisDRAFTINTERIM'Parameter checking routines in DirectShow are susceptable to a buffer overrun attack. An attacker could exploit this flaw by creating a specially crafted MIDI file and hosting on a web site or send it as an HTML email. A successful attack would cause an application crash (DoS) of DirectShow and could possibly lead to arbitrary code execution within the security context of the user.'http://www.microsoft.com/downloads/details.aspx?FamilyId=49552D6A-4A62-48BA-A2AC-0B237CD5F732&displaylang=enINTERIM1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5, Internet Explorer 5.5 Service Pack 1Tiffany BergeronINTERIMACCEPTEDInternet Explorer 5.5 and earlier allows remote attackers to display a URL in the address bar that is different than the URL that is actually being displayed, which could be used in web site spoofing attacks, aka the "Web page spoofing vulnerability."CVE-2001-0339ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003DirectXRobert L. HollisDRAFTINTERIM'Parameter checking routines in DirectShow are susceptable to a buffer overrun attack. An attacker could exploit this flaw by creating a specially crafted MIDI file and hosting on a web site or send it as an HTML email. A successful attack would cause an application crash (DoS) of DirectShow and could possibly lead to arbitrary code execution within the security context of the user.'http://www.microsoft.com/downloads/details.aspx?familyid=22F990CB-E9F9-4670-8B4F-AC4F6F66C3A2&displaylang=enINTERIM1Microsoft Windows XPMicrosoft Windows Server 2003GDI+Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED1Microsoft Windows XPNetWareRobert L. HollisDRAFTINTERIMThe Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.CVE-2005-1985INTERIM1Microsoft Windows Server 2003Internet Explorer 6.0Jonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.CVE-2004-1319ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDBuffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.CVE-2005-1211ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-complicit attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerabiity than CVE-2005-2122.CVE-2005-2118INTERIM1Microsoft Windows 2000Remote Procedure Call (RPC)Christine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDThe RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.CVE-2003-0605ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisDRAFTA remote Denial of Service vulnerability exists for the rendering of Enhanced Metafile (EMF) images. A EMF image is a 32-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to trigger a program crash on the affected system. This action would not result in an opportunity to execute code or elevate privileges. A successful attack would cause a program to stop responding. The user may need to manually kill the process using the Windows Task Manager. Once restarted, the program should operate normally until another attempt is made to open the offending image file.CAN-2005-0803DRAFT1Microsoft Windows Server 2003Microsoft Color Management ModuleChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the Microsoft Color Management Module for Windows allows remote attackers to execute arbitrary code via an image with crafted ICC profile format tags.CVE-2005-1219ACCEPTED1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows XPServices for UNIXJonathan BakerDRAFTINTERIMACCEPTEDThe Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote attackers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.CVE-2005-1205ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Tiffany BergeronDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.CVE-2004-0549ACCEPTED2Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows Server 2003TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".CVE-2005-1988ACCEPTED1Microsoft Windows XPSMB (Server Message Block)Jonathan BakerDRAFTINTERIMACCEPTEDBuffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."CVE-2005-1206ACCEPTED1Microsoft Windows 2000ISA Server 2000Christine WalzerDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMicrosoft ISA Server 2000 allows remote attackers to poison the ISA cache or bypass content restriction policies via a malformed HTTP request packet containing multiple Content-Length headers.CVE-2005-1215ACCEPTED2Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMThe FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-complicit, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.CVE-2005-2126INTERIM1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDThe legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.CVE-2002-0648ACCEPTED1Microsoft Windows Server 2003DirectXRobert L. HollisDRAFTINTERIMQUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.CVE-2005-2128INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTA remote Denial of Service vulnerability exists for the rendering of Enhanced Metafile (EMF) images. A EMF image is a 32-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to trigger a program crash on the affected system. This action would not result in an opportunity to execute code or elevate privileges. A successful attack would cause a program to stop responding. The user may need to manually kill the process using the Windows Task Manager. Once restarted, the program should operate normally until another attempt is made to open the offending image file.CAN-2005-0803DRAFT1Microsoft Windows XPInternet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM1Microsoft Windows 2000Crystal EnterpriseCrystal ReportsAndrew ButtnerJonathan BakerDirectory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.CVE-2004-0204DRAFT0Microsoft Windows 2000COM Internet ServicesChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDWindows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."CVE-2005-0047ACCEPTED2Microsoft Windows Server 2003Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisDRAFTA remote code execution vulnerability exists for the rendering of Windows Metafile (WMF) images. A WMF image is a 16-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to remotely execute arbitrary code on the target system. This action could allow the attacker to install programs, access and alter data, and escalate privileges. A successful attack would thus grant a remote attacker complete control of the affected system.CAN-2005-2123DRAFT1Microsoft Windows XPWindows Media Player 9Christine WalzerDRAFTINTERIMACCEPTEDThe OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."CVE-2005-0044ACCEPTED1Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows XPHTML Help FacilityAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.CVE-2003-1041ACCEPTED1Microsoft Windows XPMicrosoft Office XP SP3Christine WalzerDRAFTINTERIMJonathan BakerACCEPTEDStack-based buffer overflow in Microsoft Word 2000 and Word 2002, and Microsoft Works Suites 2000 through 2004, might allow remote attackers to execute arbitrary code via a .doc file with long font information.CVE-2005-0564ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-complicit attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerabiity than CVE-2005-2122.CVE-2005-2118INTERIM1Microsoft Windows XPMicrosoft AgentHarvey RubinovitzDRAFTHarvey RubinovitzINTERIMACCEPTEDMicrosoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.CVE-2005-1214ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."CVE-2005-0554ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows Server 2003Distributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.CVE-2003-0715ACCEPTED1Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDThe legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.CVE-2002-0648ACCEPTED1Microsoft Windows XPNetWareRobert L. HollisDRAFTINTERIMThe Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.CVE-2005-1985INTERIM1Microsoft Windows 2000Telephony ServiceAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003Operating SystemRobert L. HollisDRAFTA remote Denial of Service vulnerability exists for the rendering of Enhanced Metafile (EMF) images. A EMF image is a 32-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to trigger a program crash on the affected system. This action would not result in an opportunity to execute code or elevate privileges. A successful attack would cause a program to stop responding. The user may need to manually kill the process using the Windows Task Manager. Once restarted, the program should operate normally until another attempt is made to open the offending image file.CAN-2005-0803DRAFT1Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".CVE-2005-1988ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.CVE-2005-1990ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Interactive TrainingIngrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.CVE-2005-1212ACCEPTED1Microsoft Windows XPDirectXRobert L. HollisDRAFTINTERIMQUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.CVE-2005-2128INTERIM1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.CVE-2005-1990ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote attackers to execute arbitrary code via a crafted document.CVE-2005-0558ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.CVE-2005-1211ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFT'A remote Denial of Service vulnerability exists for the rendering of Enhanced Metafile (EMF) images. A EMF image is a 32-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to trigger a program crash on the affected system. This action would not result in an opportunity to execute code or elevate privileges. A successful attack would cause a program to stop responding. The user may need to manually kill the process using the Windows Task Manager. Once restarted, the program should operate normally until another attempt is made to open the offending image file.'CAN-2005-0803DRAFT1Microsoft Windows 2000Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED2Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMStack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.CVE-2005-2120INTERIM1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMnetman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function.CVE-2005-2307INTERIM1Microsoft Windows 2000TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMnetman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function.CVE-2005-2307INTERIM1Microsoft Windows XPWeb Client ServiceMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in the Web Client service in Microsoft Windows XP and Windows Server 2003 allows remote authenticated users to execute arbitrary code via a crafted WebDAV request containing special parameters.CVE-2005-1207ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows XPMicrosoft Windows Server 2003Operating SystemRobert L. HollisDRAFTA remote code execution vulnerability exists for the rendering of Windows Metafile (WMF) images. A WMF image is a 16-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to remotely execute arbitrary code on the target system. This action could allow the attacker to install programs, access and alter data, and escalate privileges. A successful attack would thus grant a remote attacker complete control of the affected system.CAN-2005-2123DRAFT1Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED2Microsoft Windows 2000DirectXRobert L. HollisDRAFTINTERIMQUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.CVE-2005-2128INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows Server 2003Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".CVE-2005-0550ACCEPTED1Microsoft Windows 98Program Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows 2000Microsoft Color Management ModuleChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the Microsoft Color Management Module for Windows allows remote attackers to execute arbitrary code via an image with crafted ICC profile format tags.CVE-2005-1219ACCEPTED1Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMThe FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-complicit, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.CVE-2005-2126INTERIM1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDWindows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).CVE-2005-0688ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMnetman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function.CVE-2005-2307INTERIM1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMWeb View in Windows Explorer on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 does not properly handle certain HTML characters in preview fields, which allows remote user-complicit attackers to execute arbitrary code.CVE-2005-2117INTERIM1Microsoft Windows 98Internet Explorer 6Internet Explorer 6 SP1Ingrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDHeap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or the "HTML Elements Vulnerability."CVE-2004-1050ACCEPTED3Microsoft Windows Server 2003Telephony ServiceAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED1Microsoft Windows XPWindows Animated CursorChristine WalzerDRAFTINTERIMACCEPTEDThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.CVE-2004-1305ACCEPTED1Microsoft Windows XPWindows Media Player 9Christine WalzerDRAFTChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."CVE-2004-1244ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."CVE-2005-0054ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED1Microsoft Windows NTWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED1Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Internet ExplorerHarvey RubinovitzDRAFTJonathan BakerINTERIMACCEPTEDInternet Explorer 6.0.2900.2180 on Windows XP allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.CVE-2005-2087ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMStack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.CVE-2005-2120INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows 2000IIS 5.0Jonathan BakerDRAFTINTERIMACCEPTEDThe WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of attributes.CVE-2003-0718ACCEPTED1Microsoft Windows 2000Microsoft Office 2000 SP3Christine WalzerDRAFTINTERIMACCEPTEDStack-based buffer overflow in Microsoft Word 2000 and Word 2002, and Microsoft Works Suites 2000 through 2004, might allow remote attackers to execute arbitrary code via a .doc file with long font information.CVE-2005-0564ACCEPTED1Microsoft Windows 2000Certificate ValidationChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.CVE-2002-0862ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzHarvey RubinovitzHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".CVE-2005-1988ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.CVE-2005-1990ACCEPTED1Microsoft Windows 2000TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows NTInternet Explorer 6Tiffany BergeronINTERIMACCEPTEDAndrew ButtnerChristine WalzerINTERIMACCEPTEDStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.CVE-2004-0212ACCEPTED1Microsoft Windows Server 2003HTML Help ActiveX ControlMatthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."CVE-2004-1043ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disallow execute permissions to the Exchange HTTP virtual directoryACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow digest or integrated windows authentication (NTLM) to connect to the Exchange HTTP virtual directoriesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disallow all access to Exchange HTTP virtual directoriesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should Display the routing groups in the Exchange System ManagerACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should Display the administrative groups in the Exchange System ManagerACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should enable forms based authenticationACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow digest or integrated windows authentication (NTLM) to connect to the Public HTTP virtual directoriesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disallow execute permissions to the Public HTTP virtual directoryACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disallow all access to Public HTTP virtual directoriesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should zero out deleted database pagesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disable all automated message generationACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow basic authentication with TSL encryption to connect to the IMAP4 serviceACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use SSL when downloading meeting requestsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use the default TCP ports for the the IMAP4 servicesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should archive all messages received by mailboxes on this storeACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should have clients support S/MIMEACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should not delete mailboxes without waiting for the store to be backed upACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should subscribe to a block list to block spamACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should limit the size of messages to and from the server to 30MBACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should limit the number of recipients in outbound messages to 5000ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disable the filtering of recipients who are not in Active DirectoryACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDCharles SchmidtINTERIMACCEPTEDMicrosoft Exchange Server 2003 should archive filtered messages1.2.9ACCEPTED2Corresponds to item 1.2.9 in the Exchange 2003 BenchmarkMicrosoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should filter messages with a blank senderACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should drop connections if the address matches filtersACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should accept messages without notifying the sender of filteringACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disable Outlook Mobile AccessACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disable ActiveSyncACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow basic authentication with TSL encryption to connect to the POP3 serviceACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use SSL when downloading meeting requestsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use TCP ports 143 and 995 for the POP3 serviceACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should have mailbox store clients support S/MIME signaturesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should enable subject logging and displayACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should enable message trackingACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disable automatic log removalACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should not disable all monitoring on this serverACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should change state to critical when any service stopsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should limit any connector scope to the routing groupACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should disallow unauthenticated entities to relay through this SMTP connectorACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should force outbound connections to use basic authentication with TLS encryptionACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should have any SMTP connectors use a smart hostACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow basic authentication with TSL encryption to connect to the SMTP serverACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should not resolve anonymous emailACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should only allow explicitly listed hosts to relay messages through this severACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use a smart host to relay SMTP messagesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should not perform reverse DNS lookups on incoming messagesACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use port 25 for outbound SMTP connectionsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use only basic authentication with TLS encryption for outbound SMTP connectionsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should enable logging of connections between SMTP hostsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should use port 25 for inbound SMTP connectionsACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Charles SchmidtDRAFTINTERIMACCEPTEDMicrosoft Exchange Server 2003 should apply sender, recipient, and connection filtersACCEPTED1Microsoft Windows Server 2003Print Spooler ServiceMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message.CVE-2005-1984ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows Server 2003TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."CVE-2005-1980INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMThe FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-complicit, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.CVE-2005-2126INTERIM1Microsoft Windows NTMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows Server 2003DirectXRobert L. HollisDRAFTINTERIMQUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.CVE-2005-2128INTERIM1Microsoft Windows XPIIS 5.1Jonathan BakerDRAFTINTERIMACCEPTEDThe WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of attributes.CVE-2003-0718ACCEPTED1Microsoft Windows XPDirectXRobert L. HollisDRAFTINTERIMQUARTZ.DLL in Microsoft Windows Media Player 9 allows remote attackers to write a null byte to arbitrary memory via an AVI file with a crafted strn element with a modified length value.CVE-2005-2128INTERIM1Microsoft Windows Server 2003MSDTCRobert L. HollisDRAFTINTERIMThe MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.CVE-2005-2119INTERIM1Microsoft Windows Server 2003Internet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM1Microsoft Windows NTCertificate ValidationChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Windows 98 and Windows NT 4.0 do not properly verify the Basic Constraints of digital certificates, allowing remote attackers to execute code, aka "New Variant of Certificate Validation Flaw Could Enable Identity Spoofing" (CAN-2002-0862).CVE-2002-1183ACCEPTED1Microsoft Windows Server 2003Internet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows XPInternet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM1Microsoft Windows 2000Operating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMCOM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.CVE-2005-1978INTERIM1Microsoft Windows 2000HTML Help FacilityAndrew ButtnerINTERIMACCEPTEDHeap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.CVE-2004-0201ACCEPTED0Microsoft Windows NTVDMIngrid SkoogIngrid SkoogACCEPTEDThe component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.CVE-2004-0118ACCEPTED2Microsoft Windows XPTIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMBuffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.CVE-2005-1987INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMStack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.CVE-2005-2120INTERIM1Microsoft Windows 2000Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIM'As Service Packs released by Microsft mature, earlier versions and releases become unspported. This equates to a cessation in software and security patches for that baseline. Using an unsupported version of Windows represents a severe security risk.'http://www.microsoft.com/spINTERIM2Microsoft Windows XPHTML Help FacilityAndrew ButtnerAndrew ButtnerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDHeap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.CVE-2004-0201ACCEPTED1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTINTERIMnetman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function.CVE-2005-2307INTERIM1Microsoft Windows 2000Internet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM1Microsoft Windows 2000NetWareRobert L. HollisDRAFTINTERIMThe Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.CVE-2005-1985INTERIM3Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows 2000Microsoft Windows XPInternet ExplorerRobert L. HollisDRAFTINTERIMMicrosoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CVE-2005-2127INTERIM2Microsoft Windows Server 2003NetWareRobert L. HollisDRAFTINTERIMThe Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.CVE-2005-1985INTERIM1Microsoft Windows XPOperating SystemRobert L. HollisDRAFTA remote code execution vulnerability exists for the rendering of Windows Metafile (WMF) images. A WMF image is a 16-bit metafile that can contain both vector and bitmap information. An unchecked buffer in the rendering libraries can allow an attacker to remotely execute arbitrary code on the target system. This action could allow the attacker to install programs, access and alter data, and escalate privileges. A successful attack would thus grant a remote attacker complete control of the affected system.CAN-2005-2123DRAFT1Microsoft Windows Server 2003Windows Internet Naming Service (WINS)Matthew BurtonDRAFTINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED1Microsoft Windows Server 2003TIPRobert L. HollisDRAFTINTERIMDistributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.CVE-2005-1979INTERIM1Microsoft Windows Server 2003Operating SystemRobert L. HollisDRAFTINTERIMWindows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerabiity than CVE-2005-2118.CVE-2005-2122INTERIM1Microsoft Windows 2000Windows kernelChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED2Microsoft Windows Server 2003Windows Media Player 9Christine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerDRAFTINTERIMACCEPTEDWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."CVE-2004-1244ACCEPTED1Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED1Microsoft Windows MEWindows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.CVE-2004-0214ACCEPTED1Microsoft Windows XPHyperTerminalHarvey RubinovitzDRAFTHarvey RubinovitzHarvey RubinovitzINTERIMChristine WalzerDavid ProulxACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED1Microsoft Windows XPSMB (Server Message Block)Christine WalzerDRAFTINTERIMACCEPTEDThe Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.CVE-2005-0045ACCEPTED1Microsoft Windows Server 2003Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDThe kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.CVE-2005-0061ACCEPTED1Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDWindows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).CVE-2005-0688ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDRace condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability".CVE-2005-0553ACCEPTED1Microsoft Windows XPInternet Explorer 6.0Jonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.CVE-2004-1319ACCEPTED2Microsoft Windows NTVDMIngrid SkoogACCEPTEDThe component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.CVE-2004-0118ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Visual Studio .NET 2003Ingrid SkoogDRAFTIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."CVE-2005-0054ACCEPTED1Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDMicrosoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."CVE-2005-0048ACCEPTED1Microsoft Windows NTWindows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.CVE-2004-0214ACCEPTED2Microsoft Windows XPMicrosoft Windows Server 2003VDMIngrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDThe Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.CVE-2004-0208ACCEPTED1Microsoft Windows Server 2003Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDThe kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.CVE-2005-0061ACCEPTED1Microsoft Windows XPTask SchedulerTiffany BergeronINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.CVE-2004-0212ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Andrew ButtnerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMChristine WalzerACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003SambaMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.CVE-2004-0963ACCEPTED1Microsoft Windows 2000Negotiate SSP interfaceIngrid SkoogINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDThe Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.CVE-2004-0119ACCEPTED2Microsoft Windows XPDistributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.CVE-2003-0715ACCEPTED1Microsoft Windows Server 2003Client Server Runtime System (CSRSS)Ingrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDStack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value.CVE-2005-0551ACCEPTED1Microsoft Windows XPProgram Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows XPProgram Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows Server 2003SMB (Server Message Block)Christine WalzerDRAFTINTERIMACCEPTEDThe Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.CVE-2005-0045ACCEPTED1Microsoft Windows NTNetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows XPEnhanced Metafile (EMF)Ingrid SkoogDRAFTINTERIMACCEPTEDUnknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer."CVE-2004-0209ACCEPTED1Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED2Microsoft Windows Server 2003Local Security Authority Subsystem Service (LSASS)Christine WalzerDRAFTINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED1Microsoft Windows XPSMB (Server Message Block)Christine WalzerDRAFTINTERIMACCEPTEDThe Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.CVE-2005-0045ACCEPTED1Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-0790ACCEPTED1Microsoft Windows 2000HTML Help FacilityAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.CVE-2003-1041ACCEPTED0Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Outlook ExpressJonathan BakerDRAFTINTERIMACCEPTEDMicrosoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.CVE-2004-0215ACCEPTED1Microsoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMChristine WalzerACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED2Microsoft Windows Server 2003Negotiate Security Software ProviderIngrid SkoogINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.CVE-2004-0119ACCEPTED2Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."CVE-2004-1043ACCEPTED1Microsoft Windows XPTask SchedulerTiffany BergeronTiffany BergeronINTERIMACCEPTEDStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.CVE-2004-0212ACCEPTED0Microsoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED1Microsoft Windows XPNegotiate SSP interfaceIngrid SkoogIngrid SkoogIngrid SkoogACCEPTEDChristine WalzerINTERIMACCEPTEDThe Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.CVE-2004-0119ACCEPTED1Microsoft Windows XPWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED2Microsoft Windows NTOutlook Web AccessChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDCross-site scripting (XSS) vulnerability in Outlook Web Access for Exchange Server 5.5 Service Pack 4 allows remote attackers to insert arbitrary script and spoof content in HTML email or web caches via an HTML redirect query.CVE-2004-0203ACCEPTED2Microsoft Windows NTWindows kernelChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".CVE-2005-0550ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows XPLocal Security Authority Subsystem Service (LSASS)Christine WalzerDRAFTINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."CVE-2005-0555ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Internet Explorer 5.5 Service Pack 2Andrew ButtnerDRAFTINTERIMACCEPTEDDouble-free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.CVE-2003-1048ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2002Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.CVE-2004-0963ACCEPTED1Microsoft Windows NTCertificate ValidationChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Windows 98 and Windows NT 4.0 do not properly verify the Basic Constraints of digital certificates, allowing remote attackers to execute code, aka "New Variant of Certificate Validation Flaw Could Enable Identity Spoofing" (CAN-2002-0862).CVE-2002-1183ACCEPTED1Microsoft Windows 2000Enhanced Metafile (EMF)Ingrid SkoogDRAFTINTERIMACCEPTEDUnknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer."CVE-2004-0209ACCEPTED1Microsoft Windows Server 2003Indexing ServiceHarvey RubinovitzDRAFTINTERIMACCEPTEDThe Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2004-0897ACCEPTED1Microsoft Windows 2000Microsoft Outlook ExpressJonathan BakerDRAFTINTERIMACCEPTEDMicrosoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.CVE-2004-0215ACCEPTED1Microsoft Windows Server 2003HTML Help FacilityAndrew ButtnerINTERIMACCEPTEDHeap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.CVE-2004-0201ACCEPTED0Microsoft Windows NTPOSIXIngrid SkoogIngrid SkoogINTERIMACCEPTEDThe POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.CVE-2004-0210ACCEPTED0Microsoft Windows XPWindows ShellHarvey RubinovitzDRAFTINTERIMACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-1060ACCEPTED1Microsoft Windows XPDirectXTiffany BergeronTiffany BergeronTiffany BergeronTiffany BergeronINTERIMACCEPTEDIDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.CVE-2004-0202ACCEPTED1Microsoft Windows NTIIS 4.0David ProulxINTERIMACCEPTEDBuffer overflow in Microsoft Internet Information Server (IIS) 4.0 allows local users to execute arbitrary code via the redirect function.CVE-2004-0205ACCEPTED0Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2000Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.CVE-2004-0963ACCEPTED1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED2Microsoft Windows XPInternet Explorer 6Christine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."CVE-2005-0554ACCEPTED1Microsoft Windows NTWindows kernelChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED1Microsoft Windows 2000MDAC 2.8Christine WalzerDRAFTINTERIMACCEPTEDMultiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.CVE-2004-0597ACCEPTED1Microsoft Windows NTDHCPIngrid SkoogDRAFTIngrid SkoogIngrid SkoogINTERIMACCEPTEDThe DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability."CVE-2004-0899ACCEPTED1Microsoft Windows XPJonathan BakerDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDThe Server service (srvsvc.dll) in Windows XP SP1 and SP2 allows remote attackers to obtain sensitive information (users who are accessing resources) via an anonymous logon using a named pipe, which is not properly authenticated, aka the "Named Pipe Vulnerability."CVE-2005-0051ACCEPTED2Microsoft Windows Server 2003SMTPChristine WalzerDRAFTChristine WalzerINTERIMACCEPTEDThe SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.CVE-2004-0840ACCEPTED1Microsoft Windows XPDistributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.CVE-2003-0352ACCEPTED1This bulletin has been superceded by MS03-039. Definition reflects updated information.Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Project Professional 2002Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.CVE-2004-0848ACCEPTED1Microsoft Windows XPCOM Internet ServicesChristine WalzerDRAFTINTERIMACCEPTEDWindows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."CVE-2005-0047ACCEPTED1Microsoft Windows 2000Windows Media Player 9Christine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerChristine WalzerDRAFTINTERIMACCEPTEDWindows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."CVE-2004-1244ACCEPTED1Microsoft Windows Server 2003Internet Explorer 6Christine WalzerINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED0Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."CVE-2005-0056ACCEPTED1Microsoft Windows NTNetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows XPDirectXTiffany BergeronTiffany BergeronTiffany BergeronINTERIMACCEPTEDChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDIDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.CVE-2004-0202ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2002Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote attackers to execute arbitrary code via a crafted document.CVE-2005-0558ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003Enhanced Metafile (EMF)Ingrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDUnknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer."CVE-2004-0209ACCEPTED1Microsoft Windows XPIndexing ServiceHarvey RubinovitzDRAFTINTERIMACCEPTEDThe Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.CVE-2004-0897ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6 on Double Byte Character Set (DBCS) systems allows remote attackers to alter displayed address bars and spoof web pages via a URL containing special characters, facilitating phishing attacks, aka the "Address Bar Spoofing on Double Byte Character Set Systems Vulnerability."CVE-2004-0844ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED2Microsoft Windows 2000Utility ManagerJonathan BakerINTERIMACCEPTEDUtility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.CVE-2004-0213ACCEPTED0Microsoft Windows NTRemote Procedure Call (RPC)Matthew BurtonDRAFTINTERIMACCEPTEDThe RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.CVE-2004-0569ACCEPTED1Microsoft Windows Server 2003DirectXTiffany BergeronTiffany BergeronTiffany BergeronINTERIMACCEPTEDIDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.CVE-2004-0202ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED1Microsoft Windows XPHyperTerminalHarvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDChristine WalzerDavid ProulxINTERIMACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED2Microsoft Windows Server 2003Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."CVE-2005-0554ACCEPTED2Microsoft Windows 2000Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerAndrew ButtnerACCEPTEDBuffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.CVE-2005-0060ACCEPTED1Microsoft Windows 2000MDAC 2.8Ingrid SkoogDRAFTINTERIMACCEPTEDThe License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbtirary code, aka the "License Logging Service Vulnerability."CVE-2005-0050ACCEPTED1Microsoft Windows XPHyperlink Object LibraryAndrew ButtnerDRAFTINTERIMACCEPTEDThe Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow.CVE-2005-0057ACCEPTED1Microsoft Windows Server 2003Windows Animated CursorChristine WalzerDRAFTINTERIMACCEPTEDThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.CVE-2004-1305ACCEPTED1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED2Microsoft Windows 98Windows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.CVE-2004-0214ACCEPTED1Microsoft Windows Server 2003Microsoft Outlook ExpressJonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.CVE-2004-0215ACCEPTED2Microsoft Windows 2000Microsoft Office 2000 SP3Christine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.CVE-2004-0573ACCEPTED2Microsoft Windows 2000Certificate ValidationChristine WalzerChristine WalzerChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.CVE-2002-0862ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Excel 2000Matthew BurtonDRAFTINTERIMACCEPTEDUnknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.CVE-2004-0846ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Word 2000Matthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote attackers to execute arbitrary code via a crafted document.CVE-2005-0558ACCEPTED1Microsoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDTCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.CVE-2004-0230ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."CVE-2005-0055ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003DirectXTiffany BergeronTiffany BergeronTiffany BergeronINTERIMACCEPTEDIDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.CVE-2004-0202ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Office 2003Ingrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000MDAC 2.5Ingrid SkoogDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDHeap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.CVE-2002-1142ACCEPTED2Microsoft Windows Server 2003Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.CVE-2005-0060ACCEPTED1Microsoft Windows NTWindows Internet Naming Service (WINS)Matthew BurtonDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Visio Professional 2002Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.CVE-2004-0848ACCEPTED1Microsoft Windows 2000Program Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."CVE-2005-0555ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzHarvey RubinovitzHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."CVE-2005-0056ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTMatthew BurtonMatthew BurtonINTERIMACCEPTEDInternet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."CVE-2004-1043ACCEPTED1Microsoft Windows 2000POSIXIngrid SkoogINTERIMACCEPTEDThe POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.CVE-2004-0210ACCEPTED0Microsoft Windows XPDistributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715.CVE-2003-0528ACCEPTED1Microsoft Windows XPCOM Internet ServicesChristine WalzerDRAFTINTERIMACCEPTEDWindows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."CVE-2005-0047ACCEPTED1Microsoft Windows XPInternet Explorer 6Christine WalzerINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED0Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."CVE-2004-0842ACCEPTED1Microsoft Windows 2000Windows Media Player 9Christine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDThe OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."CVE-2005-0044ACCEPTED2Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPAdobe Acrobat ReaderMatthew WojcikDRAFTINTERIMACCEPTEDFormat string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields.CVE-2004-1153ACCEPTED1iDEFENSE reports that deleting eBook.api from the plug_ins directory is a workaround. See http://www.idefense.com/application/poi/display?id=163&type=vulnerabilitiesMicrosoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows XPCursor and Icon FormattingChristine WalzerDRAFTINTERIMACCEPTEDInteger overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."CVE-2004-1049ACCEPTED1Microsoft Windows XPDistributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715.CVE-2003-0528ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Project Professional 2002Ingrid SkoogDRAFTIngrid SkoogINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows XPJonathan BakerDRAFTINTERIMACCEPTEDThe Server service (srvsvc.dll) in Windows XP SP1 and SP2 allows remote attackers to obtain sensitive information (users who are accessing resources) via an anonymous logon using a named pipe, which is not properly authenticated, aka the "Named Pipe Vulnerability."CVE-2005-0051ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzHarvey RubinovitzHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."CVE-2005-0054ACCEPTED1Microsoft Windows NTProgram Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Visio Professional 2002Ingrid SkoogDRAFTIngrid SkoogINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows XPExplorer.exeIngrid SkoogIngrid SkoogINTERIMACCEPTEDBuffer overflow in EXPLORER.EXE on Windows XP allows attackers to execute arbitrary code as the XP user via a desktop.ini file with a long .ShellClassInfo parameter.CVE-2003-0306ACCEPTED0Microsoft Windows NTCursor and Icon FormattingChristine WalzerDRAFTINTERIMACCEPTEDInteger overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."CVE-2004-1049ACCEPTED1Microsoft Windows Server 2003Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDRace condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability".CVE-2005-0553ACCEPTED2Microsoft Windows 2000NetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6.0 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzHarvey RubinovitzHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."CVE-2005-0055ACCEPTED1Microsoft Windows Server 2003HyperTerminalHarvey RubinovitzDRAFTHarvey RubinovitzHarvey RubinovitzINTERIMACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED1Microsoft Windows 2000Windows kernelChristine WalzerChristine WalzerINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.CVE-2003-0112ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."CVE-2005-0555ACCEPTED1Microsoft Windows XPVDMIngrid SkoogDRAFTINTERIMACCEPTEDThe Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.CVE-2004-0208ACCEPTED1Microsoft Windows NTHTML Help FacilityAndrew ButtnerINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDHeap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.CVE-2004-0201ACCEPTED1Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."CVE-2005-0054ACCEPTED1Microsoft Windows Server 2003Hyperlink Object LibraryChristine WalzerDRAFTINTERIMACCEPTEDThe Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow.CVE-2005-0057ACCEPTED1Microsoft Windows 2000Windows Animated CursorChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.CVE-2004-1305ACCEPTED2Microsoft Windows Server 2003Cursor and Icon FormattingChristine WalzerDRAFTINTERIMACCEPTEDInteger overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."CVE-2004-1049ACCEPTED1Microsoft Windows XPNetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows NTMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows XPMicrosoft Office 2003Christine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.CVE-2004-0573ACCEPTED3Microsoft Windows XPLocal Security Authority Subsystem Service (LSASS)Ingrid SkoogDRAFTINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."CVE-2005-0056ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Visio Professional 2003Ingrid SkoogDRAFTIngrid SkoogINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows XPLocal Security Authority Subsystem Service (LSASS)Christine WalzerDRAFTINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED1Microsoft Windows XPMicrosoft Office XP SP3Christine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.CVE-2004-0573ACCEPTED2Microsoft Windows NTCursor and Icon FormattingChristine WalzerDRAFTINTERIMACCEPTEDInteger overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."CVE-2004-1049ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."CVE-2004-0842ACCEPTED2Microsoft Windows XPMicrosoft Outlook ExpressJonathan BakerDRAFTINTERIMChristine WalzerACCEPTEDMicrosoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.CVE-2004-0215ACCEPTED1Microsoft Windows 2000Internet Explorer 6Christine WalzerDRAFTINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED1Microsoft Windows XPSMB (Server Message Block)Ingrid SkoogINTERIMACCEPTEDBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.CVE-2003-0345ACCEPTED0Microsoft Windows 2000Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED2Microsoft Windows 2000Task SchedulerTiffany BergeronINTERIMACCEPTEDStack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.CVE-2004-0212ACCEPTED0Microsoft Windows XPWindows ShellHarvey RubinovitzDRAFTINTERIMACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-0790ACCEPTED1Microsoft Windows Server 2003SMTPChristine WalzerDRAFTINTERIMACCEPTEDThe SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.CVE-2004-0840ACCEPTED1Microsoft Windows XPInternet Explorer 6.0Jonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.CVE-2004-1319ACCEPTED2Microsoft Windows XPNetBT Name ServiceIngrid SkoogIngrid SkoogIngrid SkoogINTERIMACCEPTEDThe NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information.CVE-2003-0661ACCEPTED0Microsoft Windows NTHTML Help ActiveX ControlMatthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."CVE-2004-1043ACCEPTED1Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDTCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.CVE-2004-0230ACCEPTED1Microsoft Windows Server 2003HTML Help FacilityAndrew ButtnerINTERIMACCEPTEDInternet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.CVE-2003-1041ACCEPTED0Microsoft Windows XPInternet Explorer 6Christine WalzerINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED0Microsoft Windows XPClient Server Runtime System (CSRSS)Ingrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDStack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value.CVE-2005-0551ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003MDAC 2.7Matthew BurtonDRAFTINTERIMACCEPTEDThe Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."CVE-2004-0847ACCEPTED1Microsoft Windows Server 2003OLEChristine WalzerChristine WalzerDRAFTINTERIMACCEPTEDThe OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."CVE-2005-0044ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows NTMDAC 2.1Ingrid SkoogDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDHeap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.CVE-2002-1142ACCEPTED2Microsoft Windows NTDHCPIngrid SkoogDRAFTINTERIMACCEPTEDThe DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability."CVE-2004-0900ACCEPTED1Microsoft Windows Server 2003MDAC 2.8Ingrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDThe License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbtirary code, aka the "License Logging Service Vulnerability."CVE-2005-0050ACCEPTED2Microsoft Windows 2000Windows ExplorerIngrid SkoogDRAFTAndrew ButtnerINTERIMACCEPTEDThe Web View DLL (webvw.dll), as used in Windows Explorer on Windows 2000 systems, does not properly filter an apostrophe ("'") in the author name in a document, which allows attackers to execute arbitrary script via extra attributes when Web View constructs a mailto: link for the preview pane when the user selects the file.CVE-2005-1191ACCEPTED1Microsoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to spoof a less restrictive security zone and execute arbitrary code via an HTML page containing URLs that contain hostnames that have been double hex encoded, which are decoded twice to generate a malicious hostname, aka the "URL Decoding Zone Spoofing Vulnerability."CVE-2005-0054ACCEPTED1Microsoft Windows NTInternet Explorer 6Christine WalzerDRAFTINTERIMACCEPTEDThe Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.CVE-2004-0420ACCEPTED1Microsoft Windows Server 2003Windows Internet Naming Service (WINS)Matthew BurtonDRAFTINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED1Microsoft Windows XPHelp and Support Center (HSC)Christine WalzerDRAFTINTERIMACCEPTEDStack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.CVE-2003-0711ACCEPTED1Microsoft Windows Server 2003Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDRace condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability".CVE-2005-0553ACCEPTED1Microsoft Windows MEProgram Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows MEInternet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Project Professional 2003Ingrid SkoogDRAFTIngrid SkoogINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."CVE-2005-0554ACCEPTED1Microsoft Windows XPWindows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED2Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDMicrosoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."CVE-2005-0048ACCEPTED1Microsoft Windows XPWindows XPMatthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-1060ACCEPTED1Microsoft Windows 2000Internet Explorer 6.0Jonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMAndrew ButtnerACCEPTEDThe DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.CVE-2004-1319ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Office XP SP2Ingrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED2Microsoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows XPWindows Help and Support CenterChristine WalzerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDStack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.CVE-2003-0711ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."CVE-2005-0055ACCEPTED1Microsoft Windows Server 2003Compressed FoldersDavid ProulxDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMatthew WojcikINTERIMACCEPTEDInteger overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.CVE-2004-0575ACCEPTED3Microsoft Windows 2000Microsoft Windows XPMicrosoft Internet Explorer 6 Service Pack 1Harvey RubinovitzDRAFTINTERIMACCEPTEDBuffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."CVE-2005-0555ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.CVE-2005-0060ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED1Microsoft Windows NTVDMIngrid SkoogDRAFTINTERIMACCEPTEDThe Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.CVE-2004-0208ACCEPTED1Microsoft Windows NTWindows Animated CursorChristine WalzerDRAFTINTERIMACCEPTEDThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.CVE-2004-1305ACCEPTED1Microsoft Windows Server 2003Distributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715.CVE-2003-0528ACCEPTED1Microsoft Windows NTHyperTerminalHarvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDThe kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.CVE-2005-0061ACCEPTED1Microsoft Windows XPGDI+Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED1Microsoft Windows XPMicrosoft Office XP SP2Ingrid SkoogDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.CVE-2004-0573ACCEPTED2Microsoft Windows NTWindows kernelChristine WalzerDRAFTINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Office XP SP3Ingrid SkoogIngrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.CVE-2004-0848ACCEPTED1Microsoft Windows 2000Microsoft Windows Server 2003Microsoft Exchange Server 2003Christine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.CVE-2005-0560ACCEPTED1Microsoft Windows 2000SMB (Server Message Block)Christine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDThe Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.CVE-2005-0045ACCEPTED2Microsoft Windows Server 2003Microsoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDIngrid SkoogINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED2Microsoft Windows XPMicrosoft Internet Explorer 6Harvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."CVE-2005-0056ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."CVE-2004-0842ACCEPTED2Microsoft Windows 2000Internet Explorer 6 SP1Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED1Microsoft Windows XPDistributed Component Object Model (DCOM) interfaceChristine WalzerDRAFTINTERIMACCEPTEDHeap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.CVE-2003-0715ACCEPTED1Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003Microsoft Excel 2002Matthew BurtonDRAFTUnknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.CVE-2004-0846DRAFT0Microsoft Windows 95Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003SambaMatthew BurtonDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote attackers to execute arbitrary code via a crafted document.CVE-2005-0558ACCEPTED1Microsoft Windows Server 2003Program Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows 2000ISA Server 2000Christine WalzerDRAFTINTERIMACCEPTEDMicrosoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results.CVE-2004-0892ACCEPTED1Microsoft Windows Server 2003Compressed FoldersDavid ProulxDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMatthew WojcikINTERIMACCEPTEDInteger overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.CVE-2004-0575ACCEPTED3Microsoft Windows NTDHCPIngrid SkoogDRAFTINTERIMACCEPTEDThe DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability."CVE-2004-0899ACCEPTED1Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Visual Studio .NET 2002Ingrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.CVE-2004-0200ACCEPTED1Microsoft Windows 2000VDMIngrid SkoogDRAFTINTERIMACCEPTEDThe Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.CVE-2004-0208ACCEPTED1Microsoft Windows NTMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.CVE-2004-0571ACCEPTED1Microsoft Windows 2000Windows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.CVE-2004-0214ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED1Microsoft Windows XPLocal Security Authority Subsystem Service (LSASS)Christine WalzerDRAFTINTERIMACCEPTEDLSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.CVE-2004-0894ACCEPTED1Microsoft Windows NTWindows Internet Naming Service (WINS)Matthew BurtonDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED2Microsoft Windows XPMessage QueuingIngrid SkoogDRAFTINTERIMACCEPTEDBuffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.CVE-2005-0059ACCEPTED1Microsoft Windows Server 2003Network News Transport Protocol (NNTP)Christine WalzerDRAFTINTERIMACCEPTEDThe Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.CVE-2004-0574ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".CVE-2005-0550ACCEPTED1Microsoft Windows Server 2003Windows kernelChristine WalzerDRAFTINTERIMACCEPTEDThe Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."CVE-2004-0893ACCEPTED1Microsoft Windows 98Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPAdobe Acrobat ReaderMatthew WojcikDRAFTINTERIMACCEPTEDMultiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.CVE-2004-0597ACCEPTED1Microsoft Windows Server 2003Program Group ConverterAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.CVE-2004-0572ACCEPTED1Microsoft Windows XPunknownChristine WalzerDRAFTINTERIMACCEPTEDThe OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability."CVE-2005-0044ACCEPTED1Microsoft Windows NTHyperTerminalHarvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED1Microsoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDMicrosoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."CVE-2005-0048ACCEPTED1Microsoft Windows NTMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows Server 2003NetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows 2000Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerAndrew ButtnerACCEPTEDThe kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.CVE-2005-0061ACCEPTED1Microsoft Windows 2000Cursor and Icon FormattingChristine WalzerDRAFTINTERIMACCEPTEDAndrew ButtnerINTERIMACCEPTEDInteger overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."CVE-2004-1049ACCEPTED2Microsoft Windows Server 2003Internet Explorer 6.0Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDBuffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."CVE-2005-0555ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDMicrosoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."CVE-2004-0727ACCEPTED1Microsoft Windows Server 2003Help and Support Center (HSC)Christine WalzerDRAFTINTERIMACCEPTEDStack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.CVE-2003-0711ACCEPTED1Microsoft Windows 2000Windows ShellHarvey RubinovitzDRAFTINTERIMAndrew ButtnerACCEPTEDThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.CVE-2005-0063ACCEPTED1Microsoft Windows Server 2003Windows MessengerMatthew BurtonDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows 2000HyperTerminalHarvey RubinovitzDRAFTINTERIMHarvey RubinovitzACCEPTEDHyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.CVE-2004-0568ACCEPTED1Microsoft Windows XPMicrosoft Word for Windows 6.0 ConverterChristine WalzerDRAFTINTERIMACCEPTEDMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.CVE-2004-0901ACCEPTED1Microsoft Windows Server 2003Internet Explorer 6.0Jonathan BakerDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDThe DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.CVE-2004-1319ACCEPTED2Microsoft Windows NTVDMIngrid SkoogDRAFTINTERIMACCEPTEDThe Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.CVE-2004-0208ACCEPTED1Microsoft Windows Server 2003IIS 6.0Jonathan BakerDRAFTINTERIMACCEPTEDThe WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of attributes.CVE-2003-0718ACCEPTED1Microsoft Windows NTMDAC 2.8Ingrid SkoogDRAFTINTERIMACCEPTEDThe License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbtirary code, aka the "License Logging Service Vulnerability."CVE-2005-0050ACCEPTED1Microsoft Windows 2000Windows 2000Matthew BurtonDRAFTINTERIMACCEPTEDTCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.CVE-2004-0230ACCEPTED1Microsoft Windows XPWindows kernelIngrid SkoogDRAFTINTERIMChristine WalzerACCEPTEDBuffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.CVE-2005-0060ACCEPTED1Microsoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDMultiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.CVE-2004-0790ACCEPTED1Microsoft Windows NTWindows NT 4.0Matthew BurtonDRAFTINTERIMACCEPTEDThe WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."CVE-2004-1080ACCEPTED1Microsoft Windows 2000Windows kernelIngrid SkoogDRAFTINTERIMChristine WalzerAndrew ButtnerACCEPTEDBuffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".CVE-2005-0550ACCEPTED1Microsoft Windows NTDHCPIngrid SkoogDRAFTINTERIMACCEPTEDThe DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability."CVE-2004-0900ACCEPTED1Microsoft Windows NTProxy Server 2.0 SP1Christine WalzerDRAFTINTERIMChristine WalzerIngrid SkoogACCEPTEDMicrosoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results.CVE-2004-0892ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."CVE-2005-0053ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDRace condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability".CVE-2005-0553ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003Windows kernelIngrid SkoogIngrid SkoogDRAFTINTERIMACCEPTEDThe kernel for Microsoft Windows Server 2003 does not reset certain values in CPU data structures, which allows local users to cause a denial of service (system crash) via a malicious program.CVE-2004-0211ACCEPTED1Microsoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003MSN MessengerChristine WalzerDRAFTINTERIMACCEPTEDGIF file validation error in MSN Messenger 6.2 allows remote attackers in a user's contact list to execute arbitrary code via a GIF image with an improper height and width.CVE-2005-0562ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly validate certain URLs in Channel Definition Format (CDF) files, which allows remote attackers to obtain sensitive information or execute arbitrary code, aka the "Channel Definition Format (CDF) Cross Domain Vulnerability."CVE-2005-0056ACCEPTED1Microsoft Windows Server 2003Microsoft Word 2003Matthew BurtonDRAFTINTERIMACCEPTEDWindows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).CVE-2005-0688ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDRace condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability".CVE-2005-0553ACCEPTED1Microsoft Windows XPMicrosoft Windows Server 2003MDAC 2.7Matthew BurtonDRAFTINTERIMACCEPTEDThe Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."CVE-2004-0847ACCEPTED1Microsoft Windows 2000Message QueuingIngrid SkoogDRAFTINTERIMChristine WalzerAndrew ButtnerACCEPTEDBuffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.CVE-2005-0059ACCEPTED1Microsoft Windows Server 2003Network News Transport Protocol (NNTP)Christine WalzerDRAFTINTERIMACCEPTEDBuffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.CVE-2004-0573ACCEPTED1Microsoft Windows NTNetwork News Transport Protocol (NNTP)Christine WalzerDRAFTINTERIMACCEPTEDThe Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.CVE-2004-0574ACCEPTED1Microsoft Windows XPNetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED1Microsoft Windows NTRemote Procedure Call (RPC)Matthew BurtonDRAFTINTERIMACCEPTED** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.CVE-2003-0569ACCEPTED1Microsoft Windows XPWindows ShellAndrew ButtnerDRAFTINTERIMACCEPTEDBuffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.CVE-2004-0214ACCEPTED1Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED2Microsoft Windows Server 2003SMTPChristine WalzerDRAFTINTERIMACCEPTEDThe SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.CVE-2004-0840ACCEPTED1Microsoft Windows MEInternet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."CVE-2004-0842ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED2Microsoft Windows 2000Network News Transport Protocol (NNTP)Christine WalzerDRAFTINTERIMACCEPTEDThe Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.CVE-2004-0574ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED1Microsoft Windows MEInternet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDHarvey RubinovitzINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED2Microsoft Windows XPCompressed FoldersDavid ProulxDRAFTINTERIMACCEPTEDJonathan BakerINTERIMACCEPTEDMatthew WojcikINTERIMACCEPTEDInteger overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.CVE-2004-0575ACCEPTED3Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."CVE-2004-0842ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 4Harvey RubinovitzDRAFTINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED1Microsoft Windows Server 2003NetDDEJonathan BakerDRAFTINTERIMACCEPTEDNetwork Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.CVE-2004-0206ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."CVE-2004-0727ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDMicrosoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."CVE-2004-0727ACCEPTED1Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Internet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."CVE-2004-0843ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 5.5 Service Pack 2Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMultiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.CVE-2003-0727ACCEPTED2Microsoft Windows Server 2003Microsoft Internet Explorer 6 Service Pack 1 for Windows Server 2003Harvey RubinovitzDRAFTINTERIMACCEPTEDMicrosoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."CVE-2004-0727ACCEPTED1Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInternet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.CVE-2004-0845ACCEPTED1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED2Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".CVE-2004-0839ACCEPTED2Microsoft Windows 2000Microsoft Internet Explorer 5.01 Service Pack 3Harvey RubinovitzDRAFTINTERIMACCEPTEDInteger overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.CVE-2004-0216ACCEPTED1Microsoft Windows XPInternet Explorer 6Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDMicrosoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."CVE-2004-0727ACCEPTED2Microsoft Windows MEInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."CVE-2004-0841ACCEPTED2Microsoft Windows MEMicrosoft Windows NTMicrosoft Windows 2000Microsoft Windows XPInternet Explorer 6 SP1Harvey RubinovitzDRAFTINTERIMACCEPTEDChristine WalzerINTERIMACCEPTEDInternet Explorer 6 on Double Byte Character Set (DBCS) systems allows remote attackers to alter displayed address bars and spoof web pages via a URL containing special characters, facilitating phishing attacks, aka the "Address Bar Spoofing on Double Byte Character Set Systems Vulnerability."CVE-2004-0844ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMMatthew WojcikACCEPTEDThe install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.CVE-2005-1477ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMMatthew WojcikACCEPTEDFirefox 1.0.3 allows remote attackers to execute arbitrary Javascript in other domains by using an IFRAME and causing the browser to navigate to a previous javascript: URL, which can lead to arbitrary code execution when combined with CVE-2005-1477.CVE-2005-1476ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDFirefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.CVE-2005-2270ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDFirefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").CVE-2005-2269ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerJonathan BakerMatthew WojcikINTERIMACCEPTEDFirefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."CVE-2005-2268ACCEPTED4Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerJonathan BakerINTERIMMatthew WojcikACCEPTEDFirefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.CVE-2005-2267ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerChristine WalzerINTERIMACCEPTEDA regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718.CVE-2005-1937ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDFirefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.CVE-2005-2265ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.5 allows remote attackers to steal sensitive information by opening a malicious link in the Firefox sidebar using the _search target, then injecting script into other pages via a data: URL.CVE-2005-2264ACCEPTED4Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerINTERIMACCEPTEDThe InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.CVE-2005-2263ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikMatthew WojcikACCEPTEDFirefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling."CVE-2005-2262ACCEPTED4Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDFirefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.CVE-2005-2261ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDThe browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user.CVE-2005-2260ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMMatthew WojcikACCEPTEDFirefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly limit privileges of Javascript eval and Script objects in the calling context, which allows remote attackers to conduct unauthorized activities via "non-DOM property overrides," a variant of CVE-2005-1160.CVE-2005-1532ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMMatthew WojcikACCEPTEDFirefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly implement certain security checks for script injection, which allows remote attackers to execute script via "Wrapped" javascript: URLs, as demonstrated using (1) a javascript: URL in a view-source: URL, (2) a javascript: URL in a jar: URL, or (3) "a nested variant."CVE-2005-1531ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerJonathan BakerINTERIMACCEPTEDThe InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.CVE-2005-2263ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikMatthew WojcikACCEPTEDThe privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.CVE-2005-1160ACCEPTED4Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDThe native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type.CVE-2005-1159ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDMultiple "missing security checks" in Firefox before 1.0.3 allow remote attackers to inject arbitrary Javascript into privileged pages using the _search target of the Firefox sidebar.CVE-2005-1158ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDFirefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."CVE-2005-1156ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDThe favicon functionality in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary code via a <LINK rel="icon"> tag with a javascript: URL in the href attribute, aka "Firelinking."CVE-2005-1155ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDFirefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary script in other domains via a setter function for a variable in the target domain, which is executed when the user visits that domain, aka "Cross-site scripting through global scope pollution."CVE-2005-1154ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikMatthew WojcikACCEPTEDFirefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option.CVE-2005-1153ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDThe Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.CVE-2005-0752ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMMatthew WojcikACCEPTEDThe find_replen function in jsstr.c in the the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.CVE-2005-0989ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFireFox 1.0.1 and Mozilla before 1.7.6 do not sufficiently address all attack vectors for loading chrome files and hijacking drag and drop events, which allows remote attackers to execute arbitrary XUL code by tricking a user into dragging a scrollbar, a variant of CVE-2005-0527, aka "Firescrolling 2."CVE-2005-0401ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.2 allows remote attackers to execute arbitrary code by tricking a user into saving a page as a Firefox sidebar panel, then using the sidebar panel to inject Javascript into a privileged page.CVE-2005-0402ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDHeap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size.CVE-2005-0399ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerINTERIMACCEPTEDThe International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.CVE-2005-0233ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox 1.0 allows remote attackers to execute arbitrary code via plugins that load "privileged content" into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka "Firescrolling."CVE-2005-0527ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka "firetabbing."CVE-2005-0231ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging."CVE-2005-0230ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks.CVE-2005-0584ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks.CVE-2005-0585ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content.CVE-2005-0586ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file.CVE-2005-0587ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6 does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain, which allows remote attackers to determine the existence of files on the local system.CVE-2005-0588ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDThe Form Fill feature in Firefox before 1.0.1 allows remote attackers to steal potentially sensitive information via an input control that monitors the values that are generated by the autocomplete capability.CVE-2005-0589ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDString handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.CVE-2005-0255ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDThe installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname.CVE-2005-0590ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTED'It has been demonstrated that the download dialog and security dialogs can be spoofed by partially covering them with an overlapping window. If this can be done without the user noticing, clicking the download button can trigger an unwanted and malicious download. That download could open an application with a known vulnerability and exploit that vulnerability.'http://www.mozilla.org/security/announce/mfsa2005-16.htmlACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDHeap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value.CVE-2005-0592ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.CVE-2005-0593ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDMozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.CVE-2004-1156ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 allows the user to store a (1) javascript: or (2) data: URLs as a Livefeed bookmark, then executes it in the security context of the currently loaded page when the user later accesses the bookmark, which could allow remote attackers to execute arbitrary code.CVE-2005-0150ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDThunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3 does not obey the network.cookie.disableCookieForMailNews preference, which could allow remote attackers bypass the user's intended privacy and security policy by using cookies in e-mail messages.CVE-2005-0149ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDThunderbird before 0.9, when running on Windows systems, uses the default handler when processing javascript: links, which invokes Internet Explorer and may expose the Thunderbird user to vulnerabilities in the version of Internet Explorer that is installed on the user's system. NOTE: since the invocation between multiple products is a common practice, and the vulnerabilities inherent in multi-product interactions are not easily enumerable, this issue might be REJECTED in the future.CVE-2005-0148ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5, when configured to use a proxy, respond to 407 proxy auth requests from arbitrary servers, which allows remote attackers to steal NTLM or SPNEGO credentials.CVE-2005-0147ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability."CVE-2004-1380ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 does not properly distinguish between user-generated and synthetic click events, which allows remote attackers to use Javascript to bypass the file download prompt when the user uses the Alt-click feature.CVE-2005-0145ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerINTERIMACCEPTEDHeap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.CVE-2004-1316ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5 allow inactive (background) tabs to focus on input being entered in the active tab, as originally reported using form fields, which allows remote attackers to steal sensitive data that is intended for other sites, which could facilitate phishing attacks.CVE-2004-1381ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5 display the secure site lock icon when a view-source: URL references a secure SSL site while an insecure page is being loaded, which could facilitate phishing attacks.CVE-2005-0144ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an insecure page loads a binary file from a trusted site, which could facilitate phishing attacks.CVE-2005-0143ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisJonathan BakerINTERIMACCEPTEDFirefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF.CVE-2005-0142ACCEPTED3Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisINTERIMACCEPTEDFirefox before 1.0 and Mozilla before 1.7.5 allow remote attackers to load local files via links "with a custom getter and toString method" that are middle-clicked by the user to be opened in a new tab.CVE-2005-0141ACCEPTED3Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDStack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.CVE-2005-1983ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDBuffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message.CVE-2005-1984ACCEPTED2Microsoft Windows Server 2003Internet ExplorerRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED3Microsoft Windows Server 2003Internet ExplorerRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".CVE-2005-1989ACCEPTED3Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED2Microsoft Windows Server 2003Operating SystemRobert L. HollisINTERIMACCEPTEDBuffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.CVE-2005-0058ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDThe Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.CVE-2005-1218ACCEPTED2Microsoft Windows 2000Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows 2000Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows XPOperating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows Server 2003Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows Server 2003Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows Server 2003Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.CVE-2005-1981ACCEPTED2Microsoft Windows Server 2003Operating SystemRobert L. HollisINTERIMACCEPTEDUnknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller.CVE-2005-1982ACCEPTED2Microsoft Windows NTMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003mozillaRobert L. HollisChristine WalzerJonathan BakerINTERIMACCEPTEDFirefox before 1.0.5 and Mozilla before 1.7.9 allows a child frame to call top.focus and other methods in a parent frame, even when the parent is in a different domain, which violates the same origin policy and allows remote attackers to steal sensitive information such as cookies and passwords from web sites whose child frames do not verify that they are in the same domain as their parents.CVE-2005-2266ACCEPTED4523790347523790246451260026985126001701502195705352379024655237902483512600271651260017156037902491512600169952379024770\.[6-8]($|\s).*0\.9($|\s).*[0-1]\.[0-7]($|\s).*|[0-1]\.[0-7]\.[0-4]($|\s).*0\.[0-8]($|\s).*1\.7($|\s).*|1\.7\.[0-3]($|\s).*0\.[6-9]($|\s).*0\.[0-9]($|\s).*[0-1]\.0($|\s).*[0-1]\.[0-7]($|\s).*|[0-1]\.[0-7]\.[0-5]($|\s).*[0-1]\.0($|\s).*[0-1]\.0($|\s).*|[0-1]\.0\.[0-1]($|\s).*[0-1]\.[0-7]($|\s).*|[0-1]\.[0-7]\.[0-6]($|\s).*[0-1]\.0($|\s).*|[0-1]\.0\.[0-2]($|\s).*[0-1]\.0($|\s).*|[0-1]\.0\.[0-2]($|\s).*[0-1]\.[0-7]($|\s).*|[0-1]\.[0-7]\.[0-8]($|\s).*[0-1]\.0($|\s).*|[0-1]\.0\.[0-4]($|\s).*[0-1]\.[0-7]($|\s).*|[0-1]\.[0-7]\.[0-7]($|\s).*[0-1]\.0($|\s).*|[0-1]\.0\.[0-3]($|\s).*1602900252460290025236.00.2900.218052379019352379019360280015841502195697260275016640138133578512600158512600149155187779500799110370560211,0,3705,31,0,3705,2103705556126.2.02081203901640138173294013817345603790212401381335666109231502195700060379024150390070325237901845237901734013818425237902051151010445039006970502195694640138133587603790198KB888258301200408523790205Service Pack 2 or less for Windows Office XP needs regex involving strings and less thanQ8339895021957023656981310.0.6626.040138133591512600136314013817323401381727060379019810.0.4330.06028001580602800158011.0.5614.055049452800472384111001503900703652379024221251180^2\.1.*$11143221085111432220371,0,4322,051260016346028001517151260012435126001171161092321471219569205126001193512600112503900692260274220011.0.3216.5614Installed51260015555126001555512600156751260015675021957017523790227srv03_qfe523790225srv03_qfe502195615952379023350219569225021956952401381336306026001156028001233140138133577401381728651260016131006714036603790168512600161950219569295021956966110.2.511040138133618253620206032640Installed11.0.6252.7Installed200311006252060379018560379018152379024550219570216037902795126002563502195700515035342800523790163140138172991005502195692816037902195126001596523790163401381728040138172686037901631.110.0.8326.01006735010.0.8326.0512600109160379021115126002577140138173045106395.1.0639401381335451503826240016028001556116027452800900892916384HttpRedirect
^http:*,PERMANENT,*
427881151260015171^4\.08\.01.*$5126001481^4\.09.*$5309031^4\.08\.02.*$523677144602800164340138172694013813356715504942400523790220502195694510067540150382128005126001597503900700925525581026535126001364512600137512600156451260015552379012805237901425126001606016028001441512600162051260016055126001560140138133574401381335655237902525126001665126001580512600158051260012545021956902110650201512600155552379019814013813356401381726747238433100115035287001401381335634013817265610923260290026275126002685512600169315126002598C:\Program Files\Windows NT\hypertrm.exe /t %15126001609Windows ME5237902201.11602800147650219569926037902534152379023952379038660280015236028001522603790413502195706550383320051260027435126002744602900276362405021956902602900276960379041864260017386426000602600165602600157964379039964379006139404220041021060280017245237903745237903746110020523790346^Service Pack [1-9]|\d{2,}$ADSTYPE_PRINTABLE_STRING.+ADSTYPE_PRINTABLE_STRING\:3$ADSTYPE_INTEGER25ADSTYPE_INTEGER1ADSTYPE_INTEGER268ADSTYPE_INTEGER25ADSTYPE_INTEGER1ADSTYPE_PRINTABLE_STRING.+ADSTYPE_INTEGER0ADSTYPE_INTEGER1ADSTYPE_INTEGER131072ADSTYPE_INTEGER2ADSTYPE_PRINTABLE_STRING.+ADSTYPE_INTEGER270ADSTYPE_INTEGER4096ADSTYPE_PRINTABLE_STRING^local\:ADSTYPE_PRINTABLE_STRING^\d+\:1\:ADSTYPE_INTEGER0ADSTYPE_INTEGER0ADSTYPE_INTEGER1ADSTYPE_INTEGER262144ADSTYPE_INTEGER1ADSTYPE_INTEGER995ADSTYPE_INTEGER110ADSTYPE_PRINTABLE_STRING^https\:\/\/ADSTYPE_INTEGER4ADSTYPE_INTEGER1ADSTYPE_INTEGER2ADSTYPE_INTEGER4ADSTYPE_INTEGER2ADSTYPE_INTEGER1ADSTYPE_INTEGER8ADSTYPE_INTEGER2ADSTYPE_PRINTABLE_STRINGFilterADSTYPE_INTEGER5000ADSTYPE_INTEGER30720ADSTYPE_INTEGER30720ADSTYPE_INTEGER2ADSTYPE_INTEGER0ADSTYPE_DN_STRING.+ADSTYPE_INTEGER993ADSTYPE_INTEGER143ADSTYPE_PRINTABLE_STRING^https\:\/\/ADSTYPE_INTEGER4ADSTYPE_INTEGER1ADSTYPE_INTEGER2ADSTYPE_INTEGER0ADSTYPE_INTEGER1ADSTYPE_INTEGER2147483648ADSTYPE_INTEGER16ADSTYPE_INTEGER2ADSTYPE_INTEGER1ADSTYPE_INTEGER512ADSTYPE_INTEGER4ADSTYPE_INTEGER64ADSTYPE_INTEGER1ADSTYPE_INTEGER1ADSTYPE_INTEGER2147483648ADSTYPE_INTEGER16ADSTYPE_INTEGER2ADSTYPE_INTEGER1ADSTYPE_INTEGER4ADSTYPE_INTEGER5125237902331147119791This will match any KB834707 rather give a list such as KB834707-ie501sp3-20040929.121357,etc1603790259501558660890089309.00.93279.00.9327150219569585126001734is the path given as: %windir%\system32\javaprxy.dll or
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRoot\
%windir%\system32
Deny Everyone: full control, modify, read&exec, Read, Writetruetruetruetrue401381726815038257001.190032509.00.00.2980512600161752379036611502195706150219570356037903835021957054523790280619732619726512600115152379016735126001733523790396502195706920041021065260027496526000350117As stated in the iDefense security advisory, if this key exists and contains a value, then the system has Interactive Training installed, and it will process .cbo files.5021957057512600273652379076606617861503539240050390070711000676405126002595200410250502195702149198009603790254151260013315126001755^4\.[0]*9\..*6318896537902519653790055049565005126002673512600168351260027265126002726512600168465674905237903595126002770602800175160290026681610923151260017271523790121^5\.[1-2]$^4\.[0]*9\.[0]+\.[0]*901^4\.[0]*9\.[0]+\.[0]*9005504701240055046162001^4\.[0]*8\..*5504952280024^Windows.*200080636020008063605021956905415237902483512600271651260017152001124414535126001720512600172050219529562001124720130512600133151260013250219568985021957069200023511060290027225015586072523790245315131260011235126001343512600128.*zipfldr\.dll.*160280015846027501675021953649100415021957059^Service Pack [0-4]$401381335624013817263^2\.7.*20008190414020008190014008.5We think, but are not sure that the affected version of bkupexec.exe is 3.60.1.298 The file should be found in C:\Program Files\VERITAS\Backup Exec\NT\bkupexec.exe523790161523790141srv03_qfe523790137srv03_qfe160037901371530903^4\.09\.00.*1523677144^4\.08\.02.*1512600891^4\.08\.01.*1502258410^4\.08\.00.*15021956927^4\.07.*200080628020008060602000806060200080606020008060602000806060200080650000060570021Microsoft Exchange 20001401381705842764131^Service Pack [0-2]$6002800140915126001515512600137512600136251260013716028001492602800149151260013635126001365126001340512600128Non-perjoritive check.*141020010Windows 98502195690460027393006,0,2600,000060280015066,0,2800,110651260011251Y401381335594013817255140861804086180410386151260013485126001342000807460^2\.6.*1370114050219568985126001361512600135523790142152379018550219569064013811335237901324103932114103931Non-perjoritive test.*1502195667214013812795021955807427801550492721003602713110052379013960271622005504926250031111602712030011550461317005.50.4522.18005.50.4134.06005.50.4134.0100523790134^Service Pack [6-9]|\d{2,}$4013811645021953649513118801452379025064276915021956901523790124152379012548719641880152379025051260013615126001355126001361512600134401381335624013817263502195689524013813355940138172551502195690451219568995131219568241512600134751260013652379013215021956902155049393005,50,4807,1700610211600010.0.6626.010.0.4333.0100057090000441410393441039344.15237909940138133554401381725552379088512600127451260011950219568246037902491603790373602800149960280014985237902516801969333.5701701443.02.25300020731301523790336512600160150219569875021957035503828270012000851025020008510250^2\.8.*$602800150660280015055237902476Non-pejorative checkInstalled2000819042020008190420^2\.71.*$200081900202000819002015237903161523790227401381734260290026046.0.2900.21806037902521415021956870^.*ServerNT.*$52379025426028001516602800151510058150Non-perjorative test.*Non-perjorative test.*11008032Non-pejorative test.*1200342314013817207401381720240138171774013817177800019904523790419.*1005815015021956823440138133632190082166037902440603790327152379024425237903296.2.020560379027480097168009315We think, but are not sure that the affected version of bkupexec.exe is 3.60.1.298 The file should be found in C:Program Files\VERITAS\Backup Exec\NT\bkupexec.exe503809065675605237902492523790249215002195686260290026202000807470200080747050219570595021957059^Service Pack 420041025020041025011603790118137011463701146^2\.5.*$602800140060273780055049378005038138006027436001503526800^2\.70.*$8.00.1942000807600200080309050219566244113012002910656980575035101100KB899753301200430Microsoft ISA Server 2000 Updates502195704452379030911003502195671315126002525512600171010026090415033668111065060603790280233106630120025730120025760273416001503831180015237902435523790242752379031515236440523644052364405236690100042050000100042050000400027523400275231603790946028001276550493416005038101700502195679990082165035231700150219538814151260027091800449014013817224WinNT20008065001140002752320008076502000807650200080765020008081805021956753126291191^2\.6.*$200080650016491121180044828004482649112464911218.0.0.447711502195611020008056102000805780512600130151260012051260013015126001201512600262250219560111x645237902437523790324ia64x86This test should fail if the 64-bit (x64 architecture) version of Windows is installed.CoPNGFilter Class150354127001416037902065.25504943400110121256028001458200080765020008076502000807980200080765020008077802000808000200080816020008081802000808180200080818020008081802000807650200080811020008081802000808180200080223020008022302000802230200080223055049229001615132^Service Pack [5-9]|\d{2,}$1523790805038193005.00.3700.1000415021956861502195686116037901916.00.3790.00001503532300900632890069264115126001255512600118334150219558805.0513121956758
^.*idq\.dll.*$
15021953645401381722415021952784015131365902150219559719007924^Service Pack [2-9]|\d{2,}$5.1331513126001243Service Pack 15131260011714277615504923250016037903266,0,3790,04013817092401381715250350247184013817214114013817125502195491960272290014013817203133115032142000414013817097401381706450381005,5,0,85135,1,0,85135,6,0,8513560851355085135108513Y5021956802.hta3360280012646.00.2800.1106200080628020008060602000806060200080606020008060602000806060200080608015021956699816456315021956685414013817202gopher://6027192200333316027154001109394020150219550804140138171342000804280200080384020008021302000802130502195340715021955695220008029608.00.194502195667215089311055021954983414013817140RASPHONE.PBK1150219561066027232500503502485615035139005.00.3502.1000Service Pack 2111502195210315021954980^.*LanmanNT.*$111427641415021954905
^.*ism\.dll.*$
1502195567150350425005.00.3315.10005.00.3314.21015.00.3105.01065.00.3103.10005.00.2920.00005.00.2919.63075.00.2919.38005.00.2919.80015021955974^Service Pack [4-9]|\d{2,}$
4
550472521005.50.4522.18005.50.4134.06005.50.4134.0100^Service Pack [3-9]|\d{2,}$5021955269515021956810^Service Pack [4-9]|\d{2,}$5.06027162200140138171164.0^6\.0+\.2600\.0+$6027131100
^.*asp\.dll.*$
111427751Terminal Server04111111111111550491311005.50.4807.2300465