Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2003-0352

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2003-0352
Last Modified 10 Sep 2008 03:18:42
Published 18 Aug 2003 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2003-0352

Summary

Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.

Vulnerable Systems

Operating System

  • Microsoft Windows 2000

  • Microsoft Windows 2003 Server Enterprise

  • Microsoft Windows 2003 Server Enterprise 64-bit

  • Microsoft Windows 2003 Server R2

  • Microsoft Windows 2003 Server Standard

  • Microsoft Windows 2003 Server Web

  • Microsoft Windows Nt 4.0

  • Microsoft Windows Xp


References

CERT-VN - VU#568148

CERT - CA-2003-19

CERT - CA-2003-16

XF - win-rpc-dcom-bo(12629)

BID - 8205

MISC - http://www.xfocus.org/documents/200307/2.html

MS - MS03-026

FULLDISC - 20030730 rpcdcom Universal offsets

FULLDISC - 20030726 Re: The French BUGTRAQ (New Win RPC Exploit)

BUGTRAQ - 20030725 The Analysis of LSD's Buffer Overrun in Windows RPC Interface(code revised )

BUGTRAQ - 20030716 [LSD] Critical security vulnerability in Microsoft Operating Systems


Last Updated: 27 May 2016 10:37:52