Vulnerability Name:

CVE-2004-0214 (CCN-15956)

Assigned:2004-04-25
Published:2004-04-25
Updated:2021-07-23
Summary:Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Sun Apr 25 2004 - 17:01:53 CDT
Microsoft's Explorer and Internet Explorer long share name buffer overflow.

Source: CCN
Type: Full-Disclosure Mailing List, Sun Apr 25 2004 - 16:38:24 CDT
Microsoft's Explorer and Internet Explorer long share name buffer overflow.

Source: MITRE
Type: CNA
CVE-2004-0214

Source: BUGTRAQ
Type: Vendor Advisory
20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.

Source: FULLDISC
Type: Vendor Advisory
20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.

Source: CCN
Type: SA11482
Windows Explorer / Internet Explorer Long Share Name Buffer Overflow

Source: SECUNIA
Type: UNKNOWN
11482

Source: CCN
Type: SECTRACK ID: 1011647
Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1011647

Source: MSKB
Type: UNKNOWN
322857

Source: CCN
Type: CIAC Information Bulletin P-007
Microsoft Windows Shell and Program Group Converter Vulnerabilities

Source: CCN
Type: US-CERT VU#616200
Microsoft Windows Shell contains a buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#616200

Source: CCN
Type: Microsoft Security Bulletin MS04-037
Vulnerability in Windows Shell Could Allow Remote Code Execution (841356)

Source: OSVDB
Type: UNKNOWN
5687

Source: CCN
Type: OSVDB ID: 5687
Microsoft Windows IE and Explorer Share Name Overflow

Source: MISC
Type: UNKNOWN
http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html

Source: BID
Type: UNKNOWN
10213

Source: CCN
Type: BID-10213
Microsoft Windows Shell Long Share Name Buffer Overrun Vulnerability

Source: MS
Type: UNKNOWN
MS04-037

Source: XF
Type: UNKNOWN
win-long-fileshare-bo(15956)

Source: XF
Type: UNKNOWN
win-long-fileshare-bo(15956)

Source: XF
Type: UNKNOWN
win-ms04037-patch(17662)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1601

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1749

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:2638

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:4345

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5307

Source: CCN
Type: Microsoft Knowledge Base Article - 322857
Windows Explorer Quits and Generates an Error Message When You Try to Map a Network Drive

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98:*:gold:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*
  • AND
  • cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5307
    V
    Windows XP Long Share Names Vulnerability
    2011-05-16
    oval:org.mitre.oval:def:1749
    V
    Windows NT Long Share Names Vulnerability
    2008-03-24
    oval:org.mitre.oval:def:1601
    V
    Windows ME Long Share Names Vulnerability
    2004-12-09
    oval:org.mitre.oval:def:2638
    V
    Windows 98 Long Share Names Vulnerability
    2004-12-09
    oval:org.mitre.oval:def:4345
    V
    Windows 2000 Long Share Names Vulnerability
    2004-12-09
    BACK
    microsoft internet explorer 6.0.2900
    microsoft windows me *
    microsoft windows xp * sp1
    microsoft windows 2000 *
    microsoft windows 98 * gold
    microsoft windows 98 *
    microsoft windows 98se *
    microsoft windows me *
    microsoft windows xp
    microsoft windows 2000 - sp3
    microsoft windows xp - sp1
    microsoft windows 2000 - sp4
    microsoft windows nt 4.0 sp6a
    microsoft windows 2003 server *
    microsoft windows nt 4.0 sp6
    microsoft windows xp - sp1
    microsoft windows 2003_server