Vulnerability Note VU#982630
Microsoft Windows Media Services fails to properly validate TCP requests
Microsoft Windows Media Services fails to properly validate TCP requests which could allow a remote, unauthenticated attacker to cause the services to refuse new TCP connections.
Microsoft Windows Media Services is an optional component that provides the ability to deliver streaming content to Windows Media clients. It is comprised of the Windows Media Unicast Service, Windows Media Station Service, Windows Media Program Service, and Windows Media Monitor Service. There is a vulnerability in the way TCP/IP connections are handled by both the Windows Media Station Service and Windows Media Monitor Service. By sending a specially crafted sequence of TCP/IP packets to either of these services, a remote, unauthenticated attacker could cause the service to stop responding or refuse additional TCP connections.
A remote, unauthenticated attacker could cause the Windows Media Station Service or Windows Media Monitor Service to stop responding or refuse new TCP connections. In order to restore functionality, the service needs to be restarted.
Microsoft has provided a patch to address this vulnerability. For details on obtaining the patch, please refer to Microsoft Security Bulletin MS04-008.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||10 Mar 2004|
CVSS Metrics (Learn More)
Microsoft credits Qualys for reporting this vulnerability.
This document was written by Damon Morda.
- CVE IDs: CAN-2003-0905
- Date Public: 09 Mar 2004
- Date First Published: 10 Mar 2004
- Date Last Updated: 11 Mar 2004
- Severity Metric: 2.20
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.