Vulnerabilites related to nortel - media_communication_server_5200
cve-2004-1305
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:46:12.431Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:712",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
               },
               {
                  name: "oval:org.mitre.oval:def:2580",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
               },
               {
                  name: "VU#697136",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/697136",
               },
               {
                  name: "MS05-002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MS",
                     "x_transferred",
                  ],
                  url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.xfocus.net/flashsky/icoExp/",
               },
               {
                  name: "oval:org.mitre.oval:def:3216",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
               },
               {
                  name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
               },
               {
                  name: "win-ani-ratenumber-dos(18667)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
               },
               {
                  name: "TA05-012A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
               },
               {
                  name: "VU#177584",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/177584",
               },
               {
                  name: "oval:org.mitre.oval:def:1304",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
               },
               {
                  name: "oval:org.mitre.oval:def:3957",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-12T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:712",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
            },
            {
               name: "oval:org.mitre.oval:def:2580",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
            },
            {
               name: "VU#697136",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/697136",
            },
            {
               name: "MS05-002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MS",
               ],
               url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.xfocus.net/flashsky/icoExp/",
            },
            {
               name: "oval:org.mitre.oval:def:3216",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
            },
            {
               name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
            },
            {
               name: "win-ani-ratenumber-dos(18667)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
            },
            {
               name: "TA05-012A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
            },
            {
               name: "VU#177584",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/177584",
            },
            {
               name: "oval:org.mitre.oval:def:1304",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
            },
            {
               name: "oval:org.mitre.oval:def:3957",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1305",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:712",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
                  },
                  {
                     name: "oval:org.mitre.oval:def:2580",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
                  },
                  {
                     name: "VU#697136",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/697136",
                  },
                  {
                     name: "MS05-002",
                     refsource: "MS",
                     url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
                  },
                  {
                     name: "http://www.xfocus.net/flashsky/icoExp/",
                     refsource: "MISC",
                     url: "http://www.xfocus.net/flashsky/icoExp/",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3216",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
                  },
                  {
                     name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
                  },
                  {
                     name: "win-ani-ratenumber-dos(18667)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
                  },
                  {
                     name: "TA05-012A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
                  },
                  {
                     name: "VU#177584",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/177584",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1304",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
                  },
                  {
                     name: "oval:org.mitre.oval:def:3957",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1305",
      datePublished: "2005-01-06T05:00:00",
      dateReserved: "2004-12-21T00:00:00",
      dateUpdated: "2024-08-08T00:46:12.431Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110382854111833&w=2
cve@mitre.orghttp://www.kb.cert.org/vuls/id/177584Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/697136Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-012A.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.xfocus.net/flashsky/icoExp/Vendor Advisory
cve@mitre.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18667
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110382854111833&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/177584Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/697136Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-012A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.xfocus.net/flashsky/icoExp/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18667
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712
Impacted products
Vendor Product Version
nortel ip_softphone_2050 *
nortel media_communication_server_5100 3.0
nortel media_communication_server_5200 3.0
nortel media_processing_server *
nortel periphonics *
nortel symposium_agent *
nortel symposium_network_control_center *
nortel symposium_tapi_service_provider *
nortel symposium_web_centre_portal *
nortel symposium_web_client *
nortel symposium_call_center_server *
nortel symposium_express_call_center *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2000 *
microsoft windows_2003_server enterprise
microsoft windows_2003_server enterprise_64-bit
microsoft windows_2003_server r2
microsoft windows_2003_server r2
microsoft windows_2003_server standard
microsoft windows_2003_server web
microsoft windows_98 *
microsoft windows_98se *
microsoft windows_me *
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_nt 4.0
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *
microsoft windows_xp *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_communication_server_5100:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A5FC74-1883-4B8E-BC95-2A1E1DC9263D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_communication_server_5200:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E1E251E-BB18-4610-875D-C7FC95621368",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:media_processing_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "228FB6B6-F558-4D63-A34A-66DDD4B037FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:periphonics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8B62D86-AD1A-404D-9251-071DD6C9EE3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_agent:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD86C573-F25A-4825-9798-8BBC29A56320",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_network_control_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9FB826-61BA-4F13-8E0B-36DCCF30177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_tapi_service_provider:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AA64080-192C-41A3-A259-74499966C07D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_centre_portal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17F13410-3380-4CB8-9E20-92E14B85ADC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:nortel:symposium_web_client:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "872353DB-616C-46F8-99F1-7C7B56DEF34F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:symposium_call_center_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D73DA-C251-4CDE-A435-AE68876C9FC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:nortel:symposium_express_call_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8126E0-6887-48C3-BA2D-286E83AB73A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "294EBA01-147B-4DA0-937E-ACBB655EDE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "4E8B7346-F2AA-434C-A048-7463EC1BB117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "BE1A6107-DE00-4A1C-87FC-9E4015165B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "E69D0E21-8C62-403E-8097-2CA403CBBB1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
                     matchCriteriaId: "B127407D-AE50-4AFE-A780-D85B5AF44A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "5D42E51C-740A-4441-8BAF-D073111B984C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
                     matchCriteriaId: "34ACB544-87DD-4D9A-99F0-A10F48C1EE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "74AD256D-4BCE-41FB-AD73-C5C63A59A06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
                     matchCriteriaId: "B518E945-5FDE-4A37-878D-6946653C91F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
                     matchCriteriaId: "2D3B703C-79B2-4FA2-9E12-713AB977A880",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA733AD2-D948-46A0-A063-D29081A56F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "799DA395-C7F8-477C-8BC7-5B4B88FB7503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "237D7C18-C8D6-4FDB-A160-FA17DD46A55A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
                     matchCriteriaId: "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "6E7E6AD3-5418-4FEA-84B5-833059CA880D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "35346A7B-2CB5-446D-B0C3-1F21D71A746D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "064F4E76-1B89-4FA5-97ED-64624285C014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
                     matchCriteriaId: "089A953C-8446-4E6F-B506-430C38DF37B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "EA262C44-C0E6-493A-B8E5-4D26E4013226",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
                     matchCriteriaId: "416F06DD-980E-4A54-822D-CBA499FD1F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F66DC6FF-2B3D-4718-838F-9E055E89961F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
                     matchCriteriaId: "656AE014-AEEC-46E8-A696-61FEA7932F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
                     matchCriteriaId: "A08D0EA1-DA1B-4C52-883A-3F156F032517",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "DA267420-56C5-4697-B0AA-52932F78B24B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
                     matchCriteriaId: "93BA426E-DD51-44AC-BE78-3164670FF9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "224F8968-9F4C-4727-AAA3-61F5578EF54C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
                     matchCriteriaId: "02BE9817-E1AE-4619-8302-CA7AA4167F48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "363E3895-A19B-42EC-B479-765168DC0B17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
                     matchCriteriaId: "FBBBF25A-709B-4716-9894-AD82180091AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "407DA6E8-0832-49FE-AE14-35C104C237EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
                     matchCriteriaId: "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "81B7961D-151D-4773-80CB-CCD0456BFEAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
                     matchCriteriaId: "82781A72-A34F-4668-9EE8-C203B04E3367",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "AFE612D2-DF38-404F-AED1-B8C9C24012DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
                     matchCriteriaId: "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "B5CAF64E-98AA-4813-A2A2-5AC3387CF230",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
                     matchCriteriaId: "BCDFDBBA-6C4F-472A-9F4F-461C424794E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
                     matchCriteriaId: "BCC5E316-FB61-408B-BAA2-7FE03D581250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
                     matchCriteriaId: "EDDD8DA8-D074-4543-AEDF-F856B5567F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "CA7BA525-6DB8-4444-934A-932AFED69816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
                     matchCriteriaId: "90CFA69B-7814-4F97-A14D-D76310065CF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
                     matchCriteriaId: "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
                     matchCriteriaId: "91D6D065-A28D-49DA-B7F4-38421FF86498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*",
                     matchCriteriaId: "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
                     matchCriteriaId: "BC176BB0-1655-4BEA-A841-C4158167CC9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
                     matchCriteriaId: "403945FA-8676-4D98-B903-48452B46F48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
                     matchCriteriaId: "4BF263CB-4239-4DB0-867C-9069ED02CAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
                     matchCriteriaId: "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*",
                     matchCriteriaId: "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
                     matchCriteriaId: "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
                     matchCriteriaId: "6A05337E-18A5-4939-85A0-69583D9B5AD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
                     matchCriteriaId: "FB2BE2DE-7B06-47ED-A674-15D45448F357",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",
      },
   ],
   id: "CVE-2004-1305",
   lastModified: "2024-11-20T23:50:33.340",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/177584",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/697136",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.xfocus.net/flashsky/icoExp/",
      },
      {
         source: "cve@mitre.org",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/177584",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/697136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.xfocus.net/flashsky/icoExp/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}