Unrated severityNVD Advisory· Published Apr 15, 2004· Updated Apr 16, 2026
CVE-2004-0362
CVE-2004-0362
Description
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
Affected products
109cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:iss:blackice_agent_server:3.6ebz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6ecb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6ecc:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6ecd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6ece:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6ecf:*:*:*:*:*:*:*
cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*
cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*+ 12 more
- cpe:2.3:a:iss:realsecure_desktop:3.6ebz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6ecb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6ecd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6ece:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0eba:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebf:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebh:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebj:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebk:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebl:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:iss:realsecure_guard:3.6ebz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ecc:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ecd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ece:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ecf:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:iss:realsecure_network_sensor:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_20.11:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.10:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.4:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_network_sensor:7.0:xpu_22.9:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:iss:realsecure_sentry:3.6ebz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ecb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ecc:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ecd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ece:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*+ 24 more
- cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:windows:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.0.1:*:windows:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.0.1_win_sr1.1:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5:*:windows:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.2:windows:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5:sr3.3:windows:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.1:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.4:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.5:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.6:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.7:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.8:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.9:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:6.5_win_sr3.10:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.1:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.10:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.11:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.2:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.3:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.4:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.5:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.6:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.7:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.8:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu22.9:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*+ 10 more
- cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*+ 10 more
- cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.kb.cert.org/vuls/id/947254nvdPatchThird Party AdvisoryUS Government Resource
- xforce.iss.net/xforce/alerts/id/166nvdPatchVendor Advisory
- www.securityfocus.com/bid/9913nvdExploitPatchVendor Advisory
- marc.infonvd
- secunia.com/advisories/11073nvd
- www.ciac.org/ciac/bulletins/o-104.shtmlnvd
- www.eeye.com/html/Research/Advisories/AD20040318.htmlnvd
- www.osvdb.org/4355nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/15442nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/15543nvd
News mentions
0No linked articles in our index yet.