Vulnerabilities > CVE-2003-0345 - Buffer Overflow vulnerability in Microsoft Windows 2000, Windows NT and Windows XP

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus

Summary

Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.

Vulnerable Configurations

Part Description Count
OS
Microsoft
42

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS03-024.NASL
descriptionThe remote host is affected by a vulnerability in its SMB stack that could allow an authenticated attacker to corrupt the memory of this host. This may result in execution of arbitrary code on this host, or an attacker may disable this host remotely.
last seen2020-06-01
modified2020-06-02
plugin id11787
published2003-07-10
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11787
titleMS03-024: SMB Request Handler Buffer Overflow (817606)

Oval

  • accepted2011-05-16T04:00:28.046-04:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameAnna Min
      organizationBigFix, Inc
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
    familywindows
    idoval:org.mitre.oval:def:118
    statusaccepted
    submitted2003-09-08T12:00:00.000-04:00
    titleWindows 2000 SMB Buffer Overflow
    version40
  • accepted2008-03-24T04:00:15.588-04:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
    familywindows
    idoval:org.mitre.oval:def:146
    statusaccepted
    submitted2004-11-02T12:00:00.000-04:00
    titleWindows NT SMB Buffer Overflow
    version44
  • accepted2011-05-16T04:02:46.401-04:00
    classvulnerability
    contributors
    • nameIngrid Skoog
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
    familywindows
    idoval:org.mitre.oval:def:3391
    statusaccepted
    submitted2004-07-19T12:00:00.000-04:00
    titleWindows XP SMB Buffer Overflow
    version42