CVE-2004-1080
Microsoft Windows NT/2000/Server 2003 - RCE
Title source: llmDescription
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16359
exploitdb
WORKING POC
VERIFIED
by class101 · c++remotewindows
https://www.exploit-db.com/exploits/909
metasploit
WORKING POC
GREAT
by hdm · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/wins/ms04_045_wins.rb
References (18)
Scores
EPSS
0.8941
EPSS Percentile
99.5%
Details
Status
published
Products (9)
microsoft/windows_2000
(5 CPE variants)
microsoft/windows_2003_server
2000
microsoft/windows_2003_server
2003
microsoft/windows_2003_server
enterprise
microsoft/windows_2003_server
enterprise_64-bit
microsoft/windows_2003_server
r2 (2 CPE variants)
microsoft/windows_2003_server
standard
microsoft/windows_2003_server
web
microsoft/windows_nt
4.0 (24 CPE variants)
Published
Jan 10, 2005
Tracked Since
Feb 18, 2026