CVE-2003-0719
Microsoft SSL - Buffer Overflow
Title source: llmDescription
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16334
exploitdb
WORKING POC
VERIFIED
by Johnny Cyberpunk · cremotewindows
https://www.exploit-db.com/exploits/275
metasploit
WORKING POC
NORMAL
by hdm · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ssl/ms04_011_pct.rb
References (9)
Scores
EPSS
0.7471
EPSS Percentile
98.9%
Details
Status
published
Products (7)
microsoft/netmeeting
microsoft/windows_2000
(2 CPE variants)
microsoft/windows_2003_server
r2
microsoft/windows_98
microsoft/windows_me
microsoft/windows_nt
4.0 sp6a
microsoft/windows_xp
Published
Jun 01, 2004
Tracked Since
Feb 18, 2026