First published: Fri Apr 16 2004(Updated: )
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft NetMeeting | ||
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows Me | ||
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 98 | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0719 is considered critical due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2003-0719, ensure that you apply the relevant patches provided by Microsoft for affected products.
CVE-2003-0719 affects Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Windows 2003 Server, and older versions such as Windows 98 and Me.
Yes, CVE-2003-0719 can be exploited remotely, allowing attackers to execute malicious code on vulnerable systems.
While the best solution is to apply patches, disabling the PCT protocol in affected applications can serve as a temporary workaround.