Vulnerability Name:

CVE-2004-0212 (CCN-16591)

Assigned:2004-07-13
Published:2004-07-13
Updated:2019-04-30
Summary:Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0212

Source: BUGTRAQ
Type: UNKNOWN
20040714 Microsoft Windows Task Scheduler '.job' Stack Overflow

Source: BUGTRAQ
Type: UNKNOWN
20040714 Unchecked buffer in mstask.dll

Source: CCN
Type: SA12060
Microsoft Windows Task Scheduler Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
12060

Source: CCN
Type: CIAC Information Bulletin 0-178
Vulnerability in Task Scheduler Could Allow Code Execution

Source: CCN
Type: US-CERT VU#228028
Microsoft Windows Task Scheduler Buffer Overflow

Source: CERT-VN
Type: US Government Resource
VU#228028

Source: CCN
Type: Microsoft Security Bulletin MS04-022
Vulnerability in Task Scheduler Could Allow Code Execution (841873)

Source: CCN
Type: NGSSoftware Insight Security Research Advisory #NISR13072004
Microsoft Windows Task Scheduler '.job' Stack Overflow

Source: MISC
Type: UNKNOWN
http://www.ngssoftware.com/advisories/mstaskjob.txt

Source: CCN
Type: OSVDB ID: 7798
Microsoft Windows Task Scheduler Remote Overflow

Source: CCN
Type: BID-10708
Microsoft Windows Task Scheduler Remote Buffer Overflow Vulnerability

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
TA04-196A

Source: MS
Type: UNKNOWN
MS04-022

Source: XF
Type: UNKNOWN
win-taskscheduler-bo(16591)

Source: XF
Type: UNKNOWN
win-taskscheduler-bo(16591)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1344

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1781

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1964

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:3428

Vulnerable Configuration:Configuration 1:
  • cpe:/a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:avaya:s8100:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:1344
    V
    Windows NT Task Scheduler Stack Overflow
    2014-02-24
    oval:org.mitre.oval:def:1781
    V
    Windows XP (64-Bit) Task Scheduler Stack Overflow
    2011-05-16
    oval:org.mitre.oval:def:1964
    V
    Windows XP (32-Bit) Task Scheduler Stack Overflow
    2011-05-16
    oval:org.mitre.oval:def:3428
    V
    Windows 2000 Task Scheduler Stack Overflow
    2004-08-25
    BACK
    avaya ip600 media servers *
    microsoft ie 6.0 sp1
    avaya definity one media server *
    avaya s8100 *
    avaya modular messaging message storage server s3400
    microsoft windows 2000 *
    microsoft windows 2000 * sp1
    microsoft windows 2000 * sp2
    microsoft windows 2000 * sp3
    microsoft windows 2000 * sp4
    microsoft windows nt 4.0 sp6a
    microsoft windows nt 4.0 sp6a
    microsoft windows nt 4.0 sp6a
    microsoft windows xp *
    microsoft windows xp *
    microsoft windows xp * gold
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft ie 6.0
    microsoft windows 2000 - sp2
    microsoft windows 2000 - sp3
    microsoft windows xp - sp1
    microsoft windows 2000 - sp4
    microsoft windows xp - sp1