First published: Fri Dec 31 2004(Updated: )
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2003 | =64-bit | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows Server 2003 | =r2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0567 is considered critical as it allows remote attackers to execute arbitrary code.
To mitigate CVE-2004-0567, apply the latest service pack or security update provided by Microsoft for the affected versions.
CVE-2004-0567 affects Windows NT Server 4.0 SP6, Windows 2000 Server SP3 and SP4, and Windows Server 2003.
Exploitation of CVE-2004-0567 could lead to remote code execution and potentially full system compromise.
Disabling the Windows Internet Naming Service (WINS) on affected systems can serve as a temporary workaround for CVE-2004-0567.