Microsoft Windows 2003 Server vulnerabilities
176 known vulnerabilities affecting microsoft/windows_2003_server.
Total CVEs
176
CISA KEV
1
actively exploited
Public exploits
65
Exploited in wild
2
Severity breakdown
CRITICAL40HIGH73MEDIUM48LOW15
Vulnerabilities
Page 7 of 9
CVE-2005-0063HIGHCVSS 7.5PoCventerprisevr2+2 more2005-05-02
CVE-2005-0063 [HIGH] CVE-2005-0063: The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP,
The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
nvd
CVE-2005-0045HIGHCVSS 7.5PoCventerpriseventerprise_64-bit+3 more2005-05-02
CVE-2005-0045 [HIGH] CVE-2005-0045: The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 respo
nvd
CVE-2005-0060HIGHCVSS 7.2venterpriseventerprise_64-bit+3 more2005-05-02
CVE-2005-0060 [HIGH] CVE-2005-0060: Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2,
Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.
nvd
CVE-2005-1184MEDIUMCVSS 5.0PoCvdatacenter_64-bitventerprise+5 more2005-05-02
CVE-2005-1184 [MEDIUM] CVE-2005-1184: The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.
nvd
CVE-2005-0550LOWCVSS 2.1vr22005-05-02
CVE-2005-0550 [LOW] CVE-2005-0550: Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows lo
Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".
nvd
CVE-2005-0416HIGHCVSS 7.5PoCventerpriseventerprise_64-bit+3 more2005-04-27
CVE-2005-0416 [HIGH] CVE-2005-0416: The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP thr
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote attackers to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based buffer overflow.
nvd
CVE-2004-0790MEDIUMCVSS 5.0PoCvr22005-04-12
CVE-2004-0790 [MEDIUM] CVE-2004-0790: Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are relate
nvd
CVE-2005-0688MEDIUMCVSS 5.0PoCvr22005-03-05
CVE-2005-0688 [MEDIUM] CVE-2005-0688: Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a
Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" vulnerability (CVE-1999-0016).
nvd
CVE-2004-0892HIGHCVSS 7.5v2000v20032005-01-27
CVE-2004-0892 [HIGH] CVE-2004-0892: Microsoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server
Microsoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results.
nvd
CVE-2004-0897CRITICALCVSS 10.0vr22005-01-11
CVE-2004-0897 [CRITICAL] CVE-2004-0897: The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length
The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
nvd
CVE-2004-0571CRITICALCVSS 10.0venterpriseventerprise_64-bit+3 more2005-01-10
CVE-2004-0571 [CRITICAL] CVE-2004-0571: Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allo
Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.
nvd
CVE-2004-0568CRITICALCVSS 10.0vdatacenter_64-bitventerprise+4 more2005-01-10
CVE-2004-0568 [CRITICAL] CVE-2004-0568: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer
nvd
CVE-2004-0901CRITICALCVSS 10.0venterpriseventerprise_64-bit+3 more2005-01-10
CVE-2004-0901 [CRITICAL] CVE-2004-0901: Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly valid
Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.
nvd
CVE-2004-1080CRITICALCVSS 10.0PoCv2000v2003+5 more2005-01-10
CVE-2004-1080 [CRITICAL] CVE-2004-1080: The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Ser
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
nvd
CVE-2004-0894HIGHCVSS 7.2PoCvdatacenter_64-bitventerprise+4 more2005-01-10
CVE-2004-0894 [HIGH] CVE-2004-0894: LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 do
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.
nvd
CVE-2004-0893HIGHCVSS 7.2vdatacenter_64-bitventerprise+4 more2005-01-10
CVE-2004-0893 [HIGH] CVE-2004-0893: The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Win
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
nvd
CVE-2004-2339HIGHCVSS 8.4vr22004-12-31
CVE-2004-2339 [HIGH] CVE-2004-2339: Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege
Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl function, which does not verify its pointer arguments. Note: this issue has been disputed, since Administrator privileges are typically required to exploit this issu
nvd
CVE-2004-0567HIGHCVSS 7.5PoCv64-bitvr22004-12-31
CVE-2004-0567 [HIGH] CVE-2004-0567: The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked b
nvd
CVE-2004-1049MEDIUMCVSS 5.1vr22004-12-31
CVE-2004-1049 [MEDIUM] CVE-2004-1049: Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attacker
Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
nvd
CVE-2004-1306MEDIUMCVSS 5.1PoCvdatacenter_64-bitventerprise+4 more2004-12-31
CVE-2004-1306 [MEDIUM] CVE-2004-1306: Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP throu
Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.
nvd