Vulnerability Note VU#353956

Microsoft Windows H.323 implementation fails to handle malformed requests

Original Release date: 14 Apr 2004 | Last revised: 14 Apr 2004

Overview

A vulnerabilities in Microsoft Windows' implementation of the multimedia telephony protocol H.323 could lead to the ability to remotely execute arbitrary code on the system.

Description

Microsoft Windows' implementation of the H.323 protocol contains a buffer overflow in the handling of requests. An attacker may be able to send a crafted request to the vulnerable system and exploit this vulnerability to execute arbitrary code. This vulnerability affects the following systems:

  • Windows XP
  • Windows Server 2003
  • Windows 2000
  • Windows 98, 98 SE, ME
  • Systems running a stand-alone version of NetMeeting prior to version 3.01 (4.4.3399)

Impact

An attacker may be able to send a crafted request to the vulnerable system and exploit this vulnerability to execute arbitrary code.

Solution

Apply a patch from the vendor
Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-14 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Microsoft for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2004-0117
  • Date Public: 13 Apr 2004
  • Date First Published: 14 Apr 2004
  • Date Last Updated: 14 Apr 2004
  • Severity Metric: 34.26
  • Document Revision: 3

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.