Vulnerabilites related to nortel - media_communication_server_5200
cve-2004-1305
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:46:12.431Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:712", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712", }, { name: "oval:org.mitre.oval:def:2580", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580", }, { name: "VU#697136", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/697136", }, { name: "MS05-002", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.xfocus.net/flashsky/icoExp/", }, { name: "oval:org.mitre.oval:def:3216", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216", }, { name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2", }, { name: "win-ani-ratenumber-dos(18667)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667", }, { name: "TA05-012A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html", }, { name: "VU#177584", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/177584", }, { name: "oval:org.mitre.oval:def:1304", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304", }, { name: "oval:org.mitre.oval:def:3957", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-23T00:00:00", descriptions: [ { lang: "en", value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-12T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:712", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712", }, { name: "oval:org.mitre.oval:def:2580", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580", }, { name: "VU#697136", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/697136", }, { name: "MS05-002", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002", }, { tags: [ "x_refsource_MISC", ], url: "http://www.xfocus.net/flashsky/icoExp/", }, { name: "oval:org.mitre.oval:def:3216", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216", }, { name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2", }, { name: "win-ani-ratenumber-dos(18667)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667", }, { name: "TA05-012A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html", }, { name: "VU#177584", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/177584", }, { name: "oval:org.mitre.oval:def:1304", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304", }, { name: "oval:org.mitre.oval:def:3957", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1305", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:712", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712", }, { name: "oval:org.mitre.oval:def:2580", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580", }, { name: "VU#697136", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/697136", }, { name: "MS05-002", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002", }, { name: "http://www.xfocus.net/flashsky/icoExp/", refsource: "MISC", url: "http://www.xfocus.net/flashsky/icoExp/", }, { name: "oval:org.mitre.oval:def:3216", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216", }, { name: "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2", }, { name: "win-ani-ratenumber-dos(18667)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667", }, { name: "TA05-012A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html", }, { name: "VU#177584", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/177584", }, { name: "oval:org.mitre.oval:def:1304", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304", }, { name: "oval:org.mitre.oval:def:3957", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1305", datePublished: "2005-01-06T05:00:00", dateReserved: "2004-12-21T00:00:00", dateUpdated: "2024-08-08T00:46:12.431Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*", matchCriteriaId: "5A140A10-720D-4FF5-9559-184D9AC33509", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:media_communication_server_5100:3.0:*:*:*:*:*:*:*", matchCriteriaId: "13A5FC74-1883-4B8E-BC95-2A1E1DC9263D", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:media_communication_server_5200:3.0:*:*:*:*:*:*:*", matchCriteriaId: "0E1E251E-BB18-4610-875D-C7FC95621368", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:media_processing_server:*:*:*:*:*:*:*:*", matchCriteriaId: "228FB6B6-F558-4D63-A34A-66DDD4B037FB", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:periphonics:*:*:*:*:*:*:*:*", matchCriteriaId: "C8B62D86-AD1A-404D-9251-071DD6C9EE3F", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:symposium_agent:*:*:*:*:*:*:*:*", matchCriteriaId: "AD86C573-F25A-4825-9798-8BBC29A56320", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:symposium_network_control_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4B9FB826-61BA-4F13-8E0B-36DCCF30177F", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:symposium_tapi_service_provider:*:*:*:*:*:*:*:*", matchCriteriaId: "6AA64080-192C-41A3-A259-74499966C07D", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:symposium_web_centre_portal:*:*:*:*:*:*:*:*", matchCriteriaId: "17F13410-3380-4CB8-9E20-92E14B85ADC4", vulnerable: true, }, { criteria: "cpe:2.3:a:nortel:symposium_web_client:*:*:*:*:*:*:*:*", matchCriteriaId: "872353DB-616C-46F8-99F1-7C7B56DEF34F", vulnerable: true, }, { criteria: "cpe:2.3:h:nortel:symposium_call_center_server:*:*:*:*:*:*:*:*", matchCriteriaId: "ED9D73DA-C251-4CDE-A435-AE68876C9FC8", vulnerable: true, }, { criteria: "cpe:2.3:h:nortel:symposium_express_call_center:*:*:*:*:*:*:*:*", matchCriteriaId: "FE8126E0-6887-48C3-BA2D-286E83AB73A0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", matchCriteriaId: "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", matchCriteriaId: "294EBA01-147B-4DA0-937E-ACBB655EDE53", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", matchCriteriaId: "4E8B7346-F2AA-434C-A048-7463EC1BB117", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", matchCriteriaId: "BE1A6107-DE00-4A1C-87FC-9E4015165B5B", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", matchCriteriaId: "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", matchCriteriaId: "E69D0E21-8C62-403E-8097-2CA403CBBB1B", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", matchCriteriaId: "B127407D-AE50-4AFE-A780-D85B5AF44A2D", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", matchCriteriaId: "5D42E51C-740A-4441-8BAF-D073111B984C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", matchCriteriaId: "34ACB544-87DD-4D9A-99F0-A10F48C1EE05", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", matchCriteriaId: "74AD256D-4BCE-41FB-AD73-C5C63A59A06D", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", matchCriteriaId: "B518E945-5FDE-4A37-878D-6946653C91F7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", matchCriteriaId: "2D3B703C-79B2-4FA2-9E12-713AB977A880", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", matchCriteriaId: "AA733AD2-D948-46A0-A063-D29081A56F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", matchCriteriaId: "799DA395-C7F8-477C-8BC7-5B4B88FB7503", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "237D7C18-C8D6-4FDB-A160-FA17DD46A55A", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", matchCriteriaId: "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", matchCriteriaId: "6E7E6AD3-5418-4FEA-84B5-833059CA880D", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "35346A7B-2CB5-446D-B0C3-1F21D71A746D", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*", matchCriteriaId: "064F4E76-1B89-4FA5-97ED-64624285C014", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", matchCriteriaId: "089A953C-8446-4E6F-B506-430C38DF37B1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", matchCriteriaId: "EA262C44-C0E6-493A-B8E5-4D26E4013226", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", matchCriteriaId: "416F06DD-980E-4A54-822D-CBA499FD1F86", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*", matchCriteriaId: "F66DC6FF-2B3D-4718-838F-9E055E89961F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", matchCriteriaId: "656AE014-AEEC-46E8-A696-61FEA7932F21", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", matchCriteriaId: "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", matchCriteriaId: "A08D0EA1-DA1B-4C52-883A-3F156F032517", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*", matchCriteriaId: "DA267420-56C5-4697-B0AA-52932F78B24B", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", matchCriteriaId: "93BA426E-DD51-44AC-BE78-3164670FF9E1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", matchCriteriaId: "224F8968-9F4C-4727-AAA3-61F5578EF54C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", matchCriteriaId: "02BE9817-E1AE-4619-8302-CA7AA4167F48", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*", matchCriteriaId: "363E3895-A19B-42EC-B479-765168DC0B17", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", matchCriteriaId: "FBBBF25A-709B-4716-9894-AD82180091AD", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", matchCriteriaId: "407DA6E8-0832-49FE-AE14-35C104C237EC", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", matchCriteriaId: "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*", matchCriteriaId: "81B7961D-151D-4773-80CB-CCD0456BFEAA", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", matchCriteriaId: "82781A72-A34F-4668-9EE8-C203B04E3367", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", matchCriteriaId: "AFE612D2-DF38-404F-AED1-B8C9C24012DE", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", matchCriteriaId: "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*", matchCriteriaId: "B5CAF64E-98AA-4813-A2A2-5AC3387CF230", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", matchCriteriaId: "BCDFDBBA-6C4F-472A-9F4F-461C424794E7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", matchCriteriaId: "BCC5E316-FB61-408B-BAA2-7FE03D581250", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", matchCriteriaId: "EDDD8DA8-D074-4543-AEDF-F856B5567F21", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*", matchCriteriaId: "CA7BA525-6DB8-4444-934A-932AFED69816", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", matchCriteriaId: "90CFA69B-7814-4F97-A14D-D76310065CF3", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", matchCriteriaId: "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", matchCriteriaId: "91D6D065-A28D-49DA-B7F4-38421FF86498", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*", matchCriteriaId: "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", matchCriteriaId: "BC176BB0-1655-4BEA-A841-C4158167CC9B", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", matchCriteriaId: "403945FA-8676-4D98-B903-48452B46F48F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", matchCriteriaId: "4BF263CB-4239-4DB0-867C-9069ED02CAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", matchCriteriaId: "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*", matchCriteriaId: "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", matchCriteriaId: "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", matchCriteriaId: "6A05337E-18A5-4939-85A0-69583D9B5AD9", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*", matchCriteriaId: "FB2BE2DE-7B06-47ED-A674-15D45448F357", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.", }, ], id: "CVE-2004-1305", lastModified: "2024-11-20T23:50:33.340", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-12-23T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/177584", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/697136", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.xfocus.net/flashsky/icoExp/", }, { source: "cve@mitre.org", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110382854111833&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/177584", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/697136", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA05-012A.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.xfocus.net/flashsky/icoExp/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }