Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_2000 | Microsoft | * | * |
Windows_2003_server | Microsoft | enterprise (including) | enterprise (including) |
Windows_2003_server | Microsoft | enterprise_64-bit (including) | enterprise_64-bit (including) |
Windows_2003_server | Microsoft | r2 (including) | r2 (including) |
Windows_2003_server | Microsoft | standard (including) | standard (including) |
Windows_2003_server | Microsoft | web (including) | web (including) |
Windows_nt | Microsoft | 4.0 (including) | 4.0 (including) |
Windows_nt | Microsoft | 4.0-sp1 (including) | 4.0-sp1 (including) |
Windows_nt | Microsoft | 4.0-sp2 (including) | 4.0-sp2 (including) |
Windows_nt | Microsoft | 4.0-sp3 (including) | 4.0-sp3 (including) |
Windows_nt | Microsoft | 4.0-sp4 (including) | 4.0-sp4 (including) |
Windows_nt | Microsoft | 4.0-sp5 (including) | 4.0-sp5 (including) |
Windows_nt | Microsoft | 4.0-sp6 (including) | 4.0-sp6 (including) |
Windows_nt | Microsoft | 4.0-sp6a (including) | 4.0-sp6a (including) |
Windows_xp | Microsoft | * | * |