{"vuid":"VU#638548","idnumber":"638548","name":"Microsoft Windows SSP interface fails to properly validate value used during authentication protocol selection","keywords":["Microsoft","Windows","Negotiate Security Software Provider","SSP","authentication protocol selection","Q835732","MS04-011"],"overview":"A remotely exploitable vulnerability in Microsoft's Negotiate Security Software Provider (SSP) interface could permit an attacker to execute arbitrary code on the system.","clean_desc":"Microsoft's  Negotiate Security Software Provider (SSP) interface contains a buffer overflow during the processing of data sent for authentication protocol selection. A unathenticated remote attacker could send a malicious request to the SSP service to exploit this vulnerability. The following systems are affected: Windows XP\nWindows Server 2003\nWindows 2000\nSystems running Internet Information Services (IIS)","impact":"An unauthenticated remote attacker could cause a denial-of-service situation, or potentially execute arbitrary code on the system with \"SYSTEM\" privileges.","resolution":"Apply a patch from the vendor Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","4","-","0","1","1",".","m","s","p","x"],"cveids":["CVE-2004-0119"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-13T20:05:08Z","publicdate":"2004-04-13T00:00:00Z","datefirstpublished":"2004-04-14T15:23:15Z","dateupdated":"2004-04-14T15:23:44Z","revision":4,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"13","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"30.121875","cam_scorecurrentwidelyknown":"35.50078125","cam_scorecurrentwidelyknownexploited":"57.01640625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.121875,"vulnote":null}