Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2004-1305

EPSS 78.47% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2004-1305

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft WINDOWS ANI 光标文件处理内核崩溃和内核拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ANI是WINDOWS 支持的动画光标格式. WINDOWS在处理错误的光标格式的时候存在问题,远程攻击者可以利用这个漏洞使内核崩溃,蓝屏重启或内核被拒绝服务。 ANI是WINDOWS 支持的动画光标格式,在ANI是由多个普通的光标文件组成一个动画,其中ANI 文件的头处会标记是几个图标frame,WINDOWS 的内核在显示光标的时候并未对该值进行检查,如果将这个数字设置为0,会导致受影响的WINDOWS系统计算出错误的光标的地址并加以访问,触发了内核的蓝屏崩溃。不仅仅是应用使用ANI文件时会触发,只要
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2004-1305

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2004-1305

登录查看更多情报信息。

Same Patch Batch · n/a · 2005-01-06 · 27 CVEs total

CVE-2004-1329IBM AIX Diag本地特权提升漏洞
CVE-2005-0022Exim auth_spa_server()缓冲区溢出漏洞
CVE-2005-0021Exim host_aton本地缓冲区溢出漏洞
CVE-2004-1339Oracle SQL注入漏洞
CVE-2004-1338Oracle Trigger权限提升漏洞
CVE-2004-1337Linux内核Capability LSM模块进程特权信任状本地权限提升漏洞
CVE-2004-1336Debian Tetex-Bin Xdvizilla创建不安全临时文件漏洞
CVE-2004-1335Linux Kernel多个本地漏洞
CVE-2004-1334Linux Kernel多个本地漏洞
CVE-2004-1333Linux Kernel多个本地漏洞
CVE-2004-1332HP - UX FTP服务器调试日志记录模式缓冲区溢出漏洞
CVE-2004-1331Microsoft Internet Explorer安全漏洞
CVE-2004-1330IBM AIX PAGINIT本地缓冲区溢出漏洞
CVE-2004-1236多个向量LDAP远程缓冲区溢出漏洞
CVE-2004-1328HP-UX未明newgrp本地权限提升漏洞
CVE-2004-1327Crystal Art Crystal FTP远程客户端缓冲区溢出漏洞
CVE-2004-1326Ultrix DXTerm设置参数 本地缓冲区溢出漏洞
CVE-2004-1325Windows多媒体播放器ActiveX控件文件列举漏洞
CVE-2004-1324Windows多媒体播放器ActiveX控件媒体文件属性腐败漏洞
CVE-2004-1323NetBSD compat子系统服务拒绝(内核崩溃)漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2004-1305

No comments yet


Leave a comment