First published: Tue Mar 23 2004(Updated: )
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM ISS BlackICE Agent Server | =3.6ebz | |
IBM ISS BlackICE Agent Server | =3.6eca | |
IBM ISS BlackICE Agent Server | =3.6ecb | |
IBM ISS BlackICE Agent Server | =3.6ecc | |
IBM ISS BlackICE Agent Server | =3.6ecd | |
IBM ISS BlackICE Agent Server | =3.6ece | |
IBM ISS BlackICE Agent Server | =3.6ecf | |
IBM ISS BlackICE PC Protection | =3.6cbz | |
IBM ISS BlackICE PC Protection | =3.6cca | |
IBM ISS BlackICE PC Protection | =3.6ccb | |
IBM ISS BlackICE PC Protection | =3.6ccc | |
IBM ISS BlackICE PC Protection | =3.6ccd | |
IBM ISS BlackICE PC Protection | =3.6cce | |
IBM ISS BlackICE PC Protection | =3.6ccf | |
ISS BlackICE Server Protection | =3.6cbz | |
ISS BlackICE Server Protection | =3.6cca | |
ISS BlackICE Server Protection | =3.6ccb | |
ISS BlackICE Server Protection | =3.6ccc | |
ISS BlackICE Server Protection | =3.6ccd | |
ISS BlackICE Server Protection | =3.6cce | |
ISS BlackICE Server Protection | =3.6ccf | |
Iss Realsecure Desktop | =3.6ebz | |
Iss Realsecure Desktop | =3.6eca | |
Iss Realsecure Desktop | =3.6ecb | |
Iss Realsecure Desktop | =3.6ecd | |
Iss Realsecure Desktop | =3.6ece | |
Iss Realsecure Desktop | =3.6ecf | |
Iss Realsecure Desktop | =7.0eba | |
Iss Realsecure Desktop | =7.0ebf | |
Iss Realsecure Desktop | =7.0ebg | |
Iss Realsecure Desktop | =7.0ebh | |
Iss Realsecure Desktop | =7.0ebj | |
Iss Realsecure Desktop | =7.0ebk | |
Iss Realsecure Desktop | =7.0ebl | |
ISS RealSecure | =3.6ebz | |
ISS RealSecure | =3.6eca | |
ISS RealSecure | =3.6ecb | |
ISS RealSecure | =3.6ecc | |
ISS RealSecure | =3.6ecd | |
ISS RealSecure | =3.6ece | |
ISS RealSecure | =3.6ecf | |
ISS RealSecure | =7.0 | |
ISS RealSecure | =7.0-xpu_20.11 | |
ISS RealSecure | =7.0-xpu_22.10 | |
ISS RealSecure | =7.0-xpu_22.4 | |
ISS RealSecure | =7.0-xpu_22.9 | |
ISS RealSecure Sentry | =3.6ebz | |
ISS RealSecure Sentry | =3.6eca | |
ISS RealSecure Sentry | =3.6ecb | |
ISS RealSecure Sentry | =3.6ecc | |
ISS RealSecure Sentry | =3.6ecd | |
ISS RealSecure Sentry | =3.6ece | |
ISS RealSecure Sentry | =3.6ecf | |
ISS RealSecure | =6.0 | |
ISS RealSecure | =6.0.1 | |
ISS RealSecure | =6.0.1_win_sr1.1 | |
ISS RealSecure | =6.5 | |
ISS RealSecure | =6.5-sr3.2 | |
ISS RealSecure | =6.5-sr3.3 | |
ISS RealSecure | =6.5_win_sr3.1 | |
ISS RealSecure | =6.5_win_sr3.4 | |
ISS RealSecure | =6.5_win_sr3.5 | |
ISS RealSecure | =6.5_win_sr3.6 | |
ISS RealSecure | =6.5_win_sr3.7 | |
ISS RealSecure | =6.5_win_sr3.8 | |
ISS RealSecure | =6.5_win_sr3.9 | |
ISS RealSecure | =6.5_win_sr3.10 | |
ISS RealSecure | =7.0-xpu22.1 | |
ISS RealSecure | =7.0-xpu22.10 | |
ISS RealSecure | =7.0-xpu22.11 | |
ISS RealSecure | =7.0-xpu22.2 | |
ISS RealSecure | =7.0-xpu22.3 | |
ISS RealSecure | =7.0-xpu22.4 | |
ISS RealSecure | =7.0-xpu22.5 | |
ISS RealSecure | =7.0-xpu22.6 | |
ISS RealSecure | =7.0-xpu22.7 | |
ISS RealSecure | =7.0-xpu22.8 | |
ISS RealSecure | =7.0-xpu22.9 | |
IBM Proventia A Series XPU | =20.11 | |
IBM Proventia A Series XPU | =22.1 | |
IBM Proventia A Series XPU | =22.2 | |
IBM Proventia A Series XPU | =22.3 | |
IBM Proventia A Series XPU | =22.4 | |
IBM Proventia A Series XPU | =22.5 | |
IBM Proventia A Series XPU | =22.6 | |
IBM Proventia A Series XPU | =22.7 | |
IBM Proventia A Series XPU | =22.8 | |
IBM Proventia A Series XPU | =22.9 | |
IBM Proventia A Series XPU | =22.10 | |
IBM Proventia G Series XPU | =22.1 | |
IBM Proventia G Series XPU | =22.2 | |
IBM Proventia G Series XPU | =22.3 | |
IBM Proventia G Series XPU | =22.4 | |
IBM Proventia G Series XPU | =22.5 | |
IBM Proventia G Series XPU | =22.6 | |
IBM Proventia G Series XPU | =22.7 | |
IBM Proventia G Series XPU | =22.8 | |
IBM Proventia G Series XPU | =22.9 | |
IBM Proventia G Series XPU | =22.10 | |
IBM Proventia G Series XPU | =22.11 | |
IBM Proventia M Series Xpu | =1.1 | |
IBM Proventia M Series Xpu | =1.2 | |
IBM Proventia M Series Xpu | =1.3 | |
IBM Proventia M Series Xpu | =1.4 | |
IBM Proventia M Series Xpu | =1.5 | |
IBM Proventia M Series Xpu | =1.6 | |
IBM Proventia M Series Xpu | =1.7 | |
IBM Proventia M Series Xpu | =1.8 | |
IBM Proventia M Series Xpu | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0362 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2004-0362, update affected ISS products to the latest versions that include the necessary patches.
CVE-2004-0362 affects several ISS products, including RealSecure Server Sensor, Network Sensor, and BlackICE PC Protection.
Yes, CVE-2004-0362 can be exploited remotely by sending a specially crafted packet to the vulnerable software.
CVE-2004-0362 is classified as a stack-based buffer overflow vulnerability.