Vulnerability Details : CVE-2004-0574
The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
Vulnerability category: Memory CorruptionExecute code
Threat overview for CVE-2004-0574
Top countries where our scanners detected CVE-2004-0574
Top open port discovered on systems with this issue
110
IPs affected by CVE-2004-0574 1,498
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-0574!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-0574
Probability of exploitation activity in the next 30 days: 95.50%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0574
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2004-0574
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-0574
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17641
Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5070
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=109761632831563&w=2
Mailing List;Third Party Advisory
-
http://www.coresecurity.com/common/showdoc.php?idx=420&idxseccion=10
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4392
Third Party Advisory
-
http://www.ciac.org/ciac/bulletins/p-012.shtml
Broken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5926
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5021
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17661
Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A246
Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/203126
Patch;Third Party Advisory;US Government Resource
Products affected by CVE-2004-0574
- cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:-:-:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2003:-:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*