Vulnerability Note VU#471260
Microsoft Windows logon process fails contains a buffer overflow during the logon process
The Windows Logon process (Winlogon) contains a vulnerability that may permit a remote attacker to execute arbitrary code on the system.
The Windows logon process (Winlogon) containss a buffer overflow vulnerability during the processeing of the domain value. It fails to perform checks on the size of the domain value used during the logon process before inserting it into a fixed-size buffer. Microsoft notes that systems that are not members of a domain are not affected by this vulnerability. The following systems are affected by this vulnerability:
Microsoft notes that "An attacker would require permission to modify user objects in a domain to attempt to exploit this vulnerability. Typically, only members of the Administrators or Account Operators groups would have this permission. However, this permission may have been delegated to other user accounts in the domain."
A remote attacker could execute arbitrary code on the system.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||13 Apr 2004|
CVSS Metrics (Learn More)
Thanks to Microsoft for reporting this vulnerability.
This document was written by Jason A Rafail.
- CVE IDs: CAN-2003-0806
- Date Public: 13 Apr 2004
- Date First Published: 13 Apr 2004
- Date Last Updated: 13 Apr 2004
- Severity Metric: 13.50
- Document Revision: 6
If you have feedback, comments, or additional information about this vulnerability, please send us email.