MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution (893066) (uncredentialed check)

high Nessus Plugin ID 18028

Synopsis

Arbitrary code can be executed on the remote host due to a flaw in the TCP/IP stack.

Description

The remote host runs a version of Windows that has a flaw in its TCP/IP stack.

The flaw may allow an attacker to execute arbitrary code with SYSTEM privileges on the remote host or to perform a denial of service attack against the remote host.

Proof of concept code is available to perform a denial of service attack against a vulnerable system.

Solution

Microsoft has released a set of patches for Windows 2000, XP and 2003.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2005/ms05-019

Plugin Details

Severity: High

ID: 18028

File Name: smb_kb893066.nasl

Version: 1.37

Type: remote

Agent: windows

Family: Windows

Published: 4/12/2005

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: TCP/seq_window_flaw, Host/OS, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 4/20/2004

Reference Information

CVE: CVE-2004-0230, CVE-2004-0790, CVE-2004-1060, CVE-2005-0048, CVE-2005-0688

BID: 13124, 13116

MSFT: MS05-019

MSKB: 893066