CVE-2004-1080

Microsoft Windows NT/2000/Server 2003 - RCE

Title source: llm

Description

The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16359
exploitdb WORKING POC VERIFIED
by class101 · c++remotewindows
https://www.exploit-db.com/exploits/909
metasploit WORKING POC GREAT
by hdm · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/wins/ms04_045_wins.rb

References (18)

Scores

EPSS 0.8941
EPSS Percentile 99.5%

Details

Status published
Products (9)
microsoft/windows_2000 (5 CPE variants)
microsoft/windows_2003_server 2000
microsoft/windows_2003_server 2003
microsoft/windows_2003_server enterprise
microsoft/windows_2003_server enterprise_64-bit
microsoft/windows_2003_server r2 (2 CPE variants)
microsoft/windows_2003_server standard
microsoft/windows_2003_server web
microsoft/windows_nt 4.0 (24 CPE variants)
Published Jan 10, 2005
Tracked Since Feb 18, 2026