MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066)

high Nessus Plugin ID 18023

Synopsis

Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP stack.

Description

The remote host runs a version of Windows that has a flaw in its TCP/IP stack.

The flaw could allow an attacker to execute arbitrary code with SYSTEM privileges on the remote host, or to perform a denial of service attack against the remote host.

Proof of concept code is available to perform a Denial of Service against a vulnerable system.

Solution

Microsoft has released a set of patches for Windows 2000, XP and 2003.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2005/ms05-019

Plugin Details

Severity: High

ID: 18023

File Name: smb_nt_ms05-019.nasl

Version: 1.43

Type: local

Agent: windows

Published: 4/12/2005

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/12/2005

Vulnerability Publication Date: 3/5/2005

Reference Information

CVE: CVE-2004-0230, CVE-2004-0790, CVE-2004-1060, CVE-2005-0048, CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, CVE-2005-0068, CVE-2005-0688

BID: 13116, 13124, 13658

CERT: 222750, 233754, 396645, 415294

MSFT: MS05-019

MSKB: 893066