{"vuid":"VU#471260","idnumber":"471260","name":"Microsoft Windows logon process fails contains a buffer overflow during the logon process","keywords":["Microsoft","Windows logon process","Winlogon","domain value","logon process","Q835732","MS04-011"],"overview":"The Windows Logon process (Winlogon) contains a vulnerability that may permit a remote attacker to execute arbitrary code on the system.","clean_desc":"The Windows logon process (Winlogon) containss a buffer overflow vulnerability during the processeing of the domain value. It fails to perform checks on the size of the domain value used during the logon process before inserting it into a fixed-size buffer. Microsoft notes that systems that are not members of a domain are not affected by this vulnerability. The following systems are affected by this vulnerability: Windows 2000\nWindows XP\nWindows NT 4.0 Microsoft notes that \"An attacker would require permission to modify user objects in a domain to attempt to exploit this vulnerability. Typically, only members of the Administrators or Account Operators groups would have this permission. However, this permission may have been delegated to other user accounts in the domain.\"","impact":"A remote attacker could execute arbitrary code on the system.","resolution":"Apply a patch from the vendor Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","4","-","0","1","1",".","m","s","p","x"],"cveids":["CVE-2003-0806"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-13T19:06:00Z","publicdate":"2004-04-13T00:00:00Z","datefirstpublished":"2004-04-14T02:43:49Z","dateupdated":"2004-04-14T02:45:44Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"12","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"13.5","cam_scorecurrentwidelyknown":"15.75","cam_scorecurrentwidelyknownexploited":"24.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.5,"vulnote":null}