Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-0193

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2004-0193
Last Modified 05 Sep 2008 04:37:46
Published 15 Mar 2004 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-0193

Summary

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.

Vulnerable Systems

Application

  • Iss Blackice Agent Server 3.6eca

  • Iss Blackice Pc Protection 3.6cbd

  • Iss Blackice Server Protection 3.6cbz

  • Iss Realsecure Desktop 3.6eca

  • Iss Realsecure Desktop 3.6ecf

  • Iss Realsecure Desktop 7.0ebg

  • Iss Realsecure Desktop 7.0epk

  • Iss Realsecure Guard 3.6ecb

  • Iss Realsecure Network 7.0

  • Iss Realsecure Sentry 3.6ecf

  • Iss Realsecure Server Sensor 7.0


References

CERT-VN - VU#150326

ISS - 20040226 Vulnerability in SMB Parsing in ISS Products

MISC - http://www.eeye.com/html/Research/Upcoming/20040213.html

XF - pam-smb-protocol-bo(15207)

BID - 9752

OSVDB - 4072

EEYE - AD20040226

SECUNIA - 10988

BUGTRAQ - 20040227 EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow


Last Updated: 27 May 2016 10:38:30