Vulnerability Note VU#471260

Microsoft Windows logon process fails contains a buffer overflow during the logon process

Original Release date: 13 Apr 2004 | Last revised: 13 Apr 2004


The Windows Logon process (Winlogon) contains a vulnerability that may permit a remote attacker to execute arbitrary code on the system.


The Windows logon process (Winlogon) containss a buffer overflow vulnerability during the processeing of the domain value. It fails to perform checks on the size of the domain value used during the logon process before inserting it into a fixed-size buffer. Microsoft notes that systems that are not members of a domain are not affected by this vulnerability. The following systems are affected by this vulnerability:

  • Windows 2000
  • Windows XP
  • Windows NT 4.0

Microsoft notes that "An attacker would require permission to modify user objects in a domain to attempt to exploit this vulnerability. Typically, only members of the Administrators or Account Operators groups would have this permission. However, this permission may have been delegated to other user accounts in the domain."


A remote attacker could execute arbitrary code on the system.


Apply a patch from the vendor

Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2003-0806
  • Date Public: 13 Apr 2004
  • Date First Published: 13 Apr 2004
  • Date Last Updated: 13 Apr 2004
  • Severity Metric: 13.50
  • Document Revision: 6


If you have feedback, comments, or additional information about this vulnerability, please send us email.