CVE-2004-0362 (CNNVD-200404-038)

HIGH 有利用代码
中文标题:
ISS RealSecure/BlackICE协议分析模块ICQ应答处理缓冲区溢出漏洞
英文标题:
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Modul...
CVSS分数: 7.5
发布时间: 2004-03-23 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v5
漏洞描述
中文描述:

ISS RealSecure/BlackICE的协议分析模块(PAM,Protocol Analysis Module)用于解析网络协议来执行进一步的分析和攻击检测,使用在当前所有ISS入侵检测产品中。 ISS RealSecure/BlackICE PAM监视ICQ服务器应答处理函数中存在缓冲区溢出问题,远程攻击者可以利用这个漏洞进行远程缓冲区溢出攻击,可能以SYSTEM进程权限在系统上执行任意指令。 如果PAM ICQ应答处理程序接收到一个SRV_META_USER应答时,会为包含的Nickname, firstname, lastname和EMAIL地址会分配一个指向结构的指针,后续的函数会把这些数据临时拷贝到512字节的缓冲区,但并没有任何过滤检查。要调用这些受影响的函数,攻击者只需构建包含两个嵌套应答包的SRV_USER_ONLINE应答。攻击者可以伪造数据帧发送到受ISS产品保护的网络、设备、主机。

英文描述:

Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.

CWE类型:
(暂无数据)
标签:
remote windows Metasploit OSVDB-4355 Sam
受影响产品
厂商 产品 版本 版本范围 平台 CPE
iss blackice_agent_server 3.6ebz - - cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*
iss blackice_agent_server 3.6eca - - cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
iss blackice_agent_server 3.6ecb - - cpe:2.3:a:iss:blackice_agent_server:3.6ecb:*:*:*:*:*:*:*
iss blackice_agent_server 3.6ecc - - cpe:2.3:a:iss:blackice_agent_server:3.6ecc:*:*:*:*:*:*:*
iss blackice_agent_server 3.6ecd - - cpe:2.3:a:iss:blackice_agent_server:3.6ecd:*:*:*:*:*:*:*
iss blackice_agent_server 3.6ece - - cpe:2.3:a:iss:blackice_agent_server:3.6ece:*:*:*:*:*:*:*
iss blackice_agent_server 3.6ecf - - cpe:2.3:a:iss:blackice_agent_server:3.6ecf:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6cbz - - cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6cca - - cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6ccb - - cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6ccc - - cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6ccd - - cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6cce - - cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*
iss blackice_pc_protection 3.6ccf - - cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*
iss blackice_server_protection 3.6cbz - - cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
iss blackice_server_protection 3.6cca - - cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*
iss blackice_server_protection 3.6ccb - - cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*
iss blackice_server_protection 3.6ccc - - cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*
iss blackice_server_protection 3.6ccd - - cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*
iss blackice_server_protection 3.6cce - - cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*
iss blackice_server_protection 3.6ccf - - cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*
iss realsecure_desktop 3.6ebz - - cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*
iss realsecure_desktop 3.6eca - - cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
iss realsecure_desktop 3.6ecb - - cpe:2.3:a:iss:realsecure_desktop:3.6ecb:*:*:*:*:*:*:*
iss realsecure_desktop 3.6ecd - - cpe:2.3:a:iss:realsecure_desktop:3.6ecd:*:*:*:*:*:*:*
iss realsecure_desktop 3.6ece - - cpe:2.3:a:iss:realsecure_desktop:3.6ece:*:*:*:*:*:*:*
iss realsecure_desktop 3.6ecf - - cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
iss realsecure_desktop 7.0eba - - cpe:2.3:a:iss:realsecure_desktop:7.0eba:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebf - - cpe:2.3:a:iss:realsecure_desktop:7.0ebf:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebg - - cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebh - - cpe:2.3:a:iss:realsecure_desktop:7.0ebh:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebj - - cpe:2.3:a:iss:realsecure_desktop:7.0ebj:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebk - - cpe:2.3:a:iss:realsecure_desktop:7.0ebk:*:*:*:*:*:*:*
iss realsecure_desktop 7.0ebl - - cpe:2.3:a:iss:realsecure_desktop:7.0ebl:*:*:*:*:*:*:*
iss realsecure_guard 3.6ebz - - cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*
iss realsecure_guard 3.6eca - - cpe:2.3:a:iss:realsecure_guard:3.6eca:*:*:*:*:*:*:*
iss realsecure_guard 3.6ecb - - cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
iss realsecure_guard 3.6ecc - - cpe:2.3:a:iss:realsecure_guard:3.6ecc:*:*:*:*:*:*:*
iss realsecure_guard 3.6ecd - - cpe:2.3:a:iss:realsecure_guard:3.6ecd:*:*:*:*:*:*:*
iss realsecure_guard 3.6ece - - cpe:2.3:a:iss:realsecure_guard:3.6ece:*:*:*:*:*:*:*
iss realsecure_guard 3.6ecf - - cpe:2.3:a:iss:realsecure_guard:3.6ecf:*:*:*:*:*:*:*
iss realsecure_network_sensor 7.0 - - cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ebz - - cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*
iss realsecure_sentry 3.6eca - - cpe:2.3:a:iss:realsecure_sentry:3.6eca:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ecb - - cpe:2.3:a:iss:realsecure_sentry:3.6ecb:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ecc - - cpe:2.3:a:iss:realsecure_sentry:3.6ecc:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ecd - - cpe:2.3:a:iss:realsecure_sentry:3.6ecd:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ece - - cpe:2.3:a:iss:realsecure_sentry:3.6ece:*:*:*:*:*:*:*
iss realsecure_sentry 3.6ecf - - cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.0 - - cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*
iss realsecure_server_sensor 6.0.1 - - cpe:2.3:a:iss:realsecure_server_sensor:6.0.1:*:windows:*:*:*:*:*
iss realsecure_server_sensor 6.0.1_win_sr1.1 - - cpe:2.3:a:iss:realsecure_server_sensor:6.0.1_win_sr1.1:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5:*:windows:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.1 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.1:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.4 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.4:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.5 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.5:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.6 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.6:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.7 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.7:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.8 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.8:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.9 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.9:*:*:*:*:*:*:*
iss realsecure_server_sensor 6.5_win_sr3.10 - - cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.10:*:*:*:*:*:*:*
iss realsecure_server_sensor 7.0 - - cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.1:*:*:*:*:*:*
iss proventia_a_series_xpu 20.11 - - cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.1 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.2 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.3 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.4 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.5 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.6 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.7 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.8 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.9 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*
iss proventia_a_series_xpu 22.10 - - cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.1 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.2 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.3 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.4 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.5 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.6 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.7 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.8 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.9 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.10 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*
iss proventia_g_series_xpu 22.11 - - cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.1 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.2 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.3 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.4 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.5 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.6 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.7 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.8 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*
iss proventia_m_series_xpu 1.9 - - cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20040318 Vulnerability in ICQ Parsing in ISS Products third-party-advisory
cve.org
访问
9913 vdb-entry
cve.org
访问
11073 third-party-advisory
cve.org
访问
O-104 third-party-advisory
cve.org
访问
AD20040318 third-party-advisory
cve.org
访问
pam-icq-parsing-bo(15442) vdb-entry
cve.org
访问
4355 vdb-entry
cve.org
访问
VU#947254 third-party-advisory
cve.org
访问
20040318 EEYE: Internet Security Systems PAM ICQ Server Response Processing Vulnerability mailing-list
cve.org
访问
witty-worm-propagation(15543) vdb-entry
cve.org
访问
ExploitDB EDB-16464 EXPLOIT
exploitdb
访问
Download Exploit EDB-16464 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2004-0362 ADVISORY
cve.org
访问
ExploitDB EDB-168 EXPLOIT
exploitdb
访问
Download Exploit EDB-168 EXPLOIT
exploitdb
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2004-03-23 05:00:00
修改时间:
2024-08-08 00:17:14
创建时间:
2025-11-11 15:32:21
更新时间:
2026-01-26 02:16:30
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-0362 2025-11-11 15:17:29 2025-11-11 07:32:21
NVD nvd_CVE-2004-0362 2025-11-11 14:50:54 2025-11-11 07:41:07
CNNVD cnnvd_CNNVD-200404-038 2025-11-11 15:08:44 2025-11-11 07:48:53
EXPLOITDB exploitdb_EDB-16464 2025-11-11 15:05:56 2025-11-11 08:11:01
EXPLOITDB exploitdb_EDB-168 2025-11-11 15:05:57 2025-11-11 08:11:14
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:11:14
references_count: 13 → 15; tags_count: 4 → 5
查看详细变更
  • references_count: 13 -> 15
  • tags_count: 4 -> 5
v4 EXPLOITDB
2025-11-11 16:11:01
references_count: 10 → 13; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 10 -> 13
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:53
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200404-038; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200404-038
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:07
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 93; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 93
  • data_sources: ['cve'] -> ['cve', 'nvd']