{"vuid":"VU#228028","idnumber":"228028","name":"Microsoft Windows Task Scheduler Buffer Overflow","keywords":["Microsoft","Windows","Task Scheduler","application name validation","Q841873","841873","MS04-022","Mstask.dll",".job","ActiveX","dynamic icon handler"],"overview":"Microsoft Windows Task Scheduler has a buffer overflow that may allow a remote or local intruder to execute arbitrary code.","clean_desc":"Microsoft Windows Task Scheduler (Mstask.dll) is a COM-based API (ActiveX control) that provides a scheduling service for executing arbitrary commands on a system. It contains a buffer overflow that is reported to be caused by failing to properly check some attribute of the names of the commands the scheduler is tasked to execute. Exploitation of this overflow could allow an intruder to execute arbitrary code if the intruder can convince the victim to visit a malicious web page or, in some circumstances, open a malicious email message, or a file with the extension .JOB. For more information, see Microsoft Security Bulletin  MS04-022. Microsoft Windows Server 2003 is reportedly not affected by this issue.","impact":"An intruder could execute arbitrary code with the privileges of the user logged into a vulnerable system.","resolution":"Apply a patch as described in Microsoft Security Bulletin  MS04-022.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft  for reporting this vulnerability in \nMS04-022","author":"This document was written by Jeffrey S. Havrilla based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/ms04-022.mspx","http://www.microsoft.com/technet/prodtechnol/windows2000serv/evaluate/featfunc/taskschd.mspx"],"cveids":["CVE-2004-0212"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-07-13T20:53:41Z","publicdate":"2004-07-13T00:00:00Z","datefirstpublished":"2004-07-14T01:38:48Z","dateupdated":"2004-07-14T02:08:55Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"16","cam_internetinfrastructure":"15","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"9","cam_attackeraccessrequired":"20","cam_scorecurrent":"46.575","cam_scorecurrentwidelyknown":"51.6375","cam_scorecurrentwidelyknownexploited":"55.6875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":46.575,"vulnote":null}