the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew  

Vulnerability Details : CVE-2004-0214

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
Publish Date : 2004-11-03 Last Update Date : 2021-07-23
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Denial Of ServiceExecute CodeOverflow
CWE ID CWE id is not defined for this vulnerability

- Related OVAL Definitions

Title Definition Id Class Family
Windows 2000 Long Share Names Vulnerability oval:org.mitre.oval:def:4345 windows
Windows 98 Long Share Names Vulnerability oval:org.mitre.oval:def:2638 windows
Windows ME Long Share Names Vulnerability oval:org.mitre.oval:def:1601 windows
Windows NT Long Share Names Vulnerability oval:org.mitre.oval:def:1749 windows
Windows XP Long Share Names Vulnerability oval:org.mitre.oval:def:5307 windows
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2004-0214

# Product Type Vendor Product Version Update Edition Language
1 Application Microsoft Internet Explorer 6.0.2900 * * * Version Details Vulnerabilities
2 OS Microsoft Windows 2000 * * * * Version Details Vulnerabilities
3 OS Microsoft Windows 98 * Gold * * Version Details Vulnerabilities
4 OS Microsoft Windows Me * * * * Version Details Vulnerabilities
5 OS Microsoft Windows Xp * SP1 Tablet Pc * Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Microsoft Internet Explorer 1
Microsoft Windows 2000 1
Microsoft Windows 98 1
Microsoft Windows Me 1
Microsoft Windows Xp 1

- References For CVE-2004-0214
OVAL oval:org.mitre.oval:def:1601
OVAL oval:org.mitre.oval:def:4345
OVAL oval:org.mitre.oval:def:2638
OVAL oval:org.mitre.oval:def:1749
OSVDB 5687
CERT-VN VU#616200
SECTRACK 1011647
XF win-ms04037-patch(17662)
XF win-long-fileshare-bo(15956)
BID 10213 Microsoft Windows Shell Long Share Name Buffer Overrun Vulnerability Release Date:2009-07-12;en-us;322857
MSKB 322857
BUGTRAQ 20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.
FULLDISC 20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.
MS MS04-037
OVAL oval:org.mitre.oval:def:5307

- Metasploit Modules Related To CVE-2004-0214

There are not any metasploit modules related to this CVE entry (Please visit for more information)

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.