Vulnerabilities > CVE-2003-0605 - Unspecified vulnerability in Microsoft Windows 2000

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

The RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.

Vulnerable Configurations

Part Description Count
OS
Microsoft
5

Exploit-Db

  • descriptionMS Windows (RPC2) Universal Exploit & DoS (RPC3) (MS03-039). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:109
    last seen2016-01-31
    modified2003-10-09
    published2003-10-09
    reporterN/A
    sourcehttps://www.exploit-db.com/download/109/
    titleMicrosoft Windows - RPC2 Universal Exploit & DoS RPC3 MS03-039
  • descriptionMS Windows 2000 RPC DCOM Interface DoS Exploit. CVE-2003-0605. Dos exploit for windows platform
    idEDB-ID:61
    last seen2016-01-31
    modified2003-07-21
    published2003-07-21
    reporterFlashsky
    sourcehttps://www.exploit-db.com/download/61/
    titleMicrosoft Windows 2000 - RPC DCOM Interface DoS Exploit
  • descriptionMS Windows RPC DCOM Remote Exploit (18 Targets). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:69
    last seen2016-01-31
    modified2003-07-29
    published2003-07-29
    reporterpHrail
    sourcehttps://www.exploit-db.com/download/69/
    titleMicrosoft Windows RPC DCOM Remote Exploit 18 Targets
  • descriptionMS Windows XP/2000 RPC Remote (non exec memory) Exploit. CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:117
    last seen2016-01-31
    modified2003-11-07
    published2003-11-07
    reporterins1der
    sourcehttps://www.exploit-db.com/download/117/
    titleMicrosoft Windows 2000/XP - RPC Remote non exec memory Exploit
  • descriptionMS Windows (RPC DCOM) Remote Exploit (w2k+XP Targets). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:66
    last seen2016-01-31
    modified2003-07-26
    published2003-07-26
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/66/
    titleMicrosoft Windows 2000/XP - RPC DCOM Remote Exploit
  • descriptionMS Windows (RPC DCOM2) Remote Exploit (MS03-039). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:103
    last seen2016-01-31
    modified2003-09-20
    published2003-09-20
    reporterFlashsky
    sourcehttps://www.exploit-db.com/download/103/
    titleMicrosoft Windows - RPC DCOM2 Remote Exploit MS03-039
  • descriptionMS Windows (RPC DCOM) Remote Buffer Overflow Exploit. CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:64
    last seen2016-01-31
    modified2003-07-25
    published2003-07-25
    reporterFlashsky
    sourcehttps://www.exploit-db.com/download/64/
    titleMicrosoft Windows - RPC DCOM Remote Buffer Overflow Exploit
  • descriptionMS Windows (RPC DCOM) Remote Exploit (48 Targets). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:70
    last seen2016-01-31
    modified2003-07-30
    published2003-07-30
    reporterN/A
    sourcehttps://www.exploit-db.com/download/70/
    titleMicrosoft Windows - RPC DCOM Remote Exploit 48 Targets
  • descriptionMS Windows (RPC DCOM) Remote Exploit (Universal Targets). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:76
    last seen2016-01-31
    modified2003-08-07
    published2003-08-07
    reporteroc192
    sourcehttps://www.exploit-db.com/download/76/
    titleMicrosoft Windows - RPC DCOM Remote Exploit Universal Targets
  • descriptionMS Windows (RPC DCOM) Scanner (MS03-039). CVE-2003-0605. Remote exploit for windows platform
    idEDB-ID:97
    last seen2016-01-31
    modified2003-09-12
    published2003-09-12
    reporterDoke Scott
    sourcehttps://www.exploit-db.com/download/97/
    titleMicrosoft Windows - RPC DCOM Scanner MS03-039

Nessus

  • NASL familyWindows
    NASL idDCOM_RPC_DOS.NASL
    descriptionIt is possible to disable the remote RPC DOM interface by sending it a malformed request. The system will need to be rebooted to recover. A remote attacker could exploit this flaw to remotely disable RPC- related programs on this host. If a denial of service attack is successful, a local attacker could escalate privileges by hijacking the epmapper pipe.
    last seen2020-06-01
    modified2020-06-02
    plugin id11798
    published2003-07-22
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11798
    titleMS03-039: Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation (824146) (intrusive check)
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS03-026.NASL
    descriptionThe remote host is running a version of Windows affected by several vulnerabilities in its RPC interface and RPCSS Service, that could allow an attacker to execute arbitrary code and gain SYSTEM privileges.
    last seen2020-06-01
    modified2020-06-02
    plugin id11790
    published2003-07-17
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11790
    titleMS03-026 / MS03-039: Buffer Overrun In RPCSS Service Could Allow Code Execution (823980 / 824146)
  • NASL familyWindows
    NASL idMSRPC_DCOM2.NASL
    descriptionThe remote host is running a version of Windows that has a flaw in its RPC interface, which may allow an attacker to execute arbitrary code and gain SYSTEM privileges. An attacker or a worm could use it to gain the control of this host. Note that this is NOT the same bug as the one described in MS03-026, which fixes the flaw exploited by the
    last seen2020-06-01
    modified2020-06-02
    plugin id11835
    published2003-09-10
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11835
    titleMS03-039: Microsoft RPC Interface Buffer Overrun (824146) (uncredentialed check)

Oval

  • accepted2011-05-16T04:00:20.426-04:00
    classvulnerability
    contributors
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionThe RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.
    familywindows
    idoval:org.mitre.oval:def:1118
    statusaccepted
    submitted2005-01-18T12:00:00.000-04:00
    titleMS Windows RPC DCOM DoS-based Privilege Escalation Vulnerability (Test 2)
    version71
  • accepted2011-05-16T04:03:07.115-04:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionThe RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.
    familywindows
    idoval:org.mitre.oval:def:494
    statusaccepted
    submitted2003-12-03T12:00:00.000-04:00
    titleMS Windows RPC DCOM DoS-based Privilege Escalation Vulnerability
    version70

Seebug

bulletinFamilyexploit
description<p><strong>漏洞描述:</strong></p><p>Remote Procedure Call (RPC)是Windows操作系统使用的一种远程过程调用协议,RPC提供进程间交互通信机制,允许在某台计算机上运行程序无缝的在远程系统上执行代码。协议本身源自OSF RPC协议,但增加了Microsoft特定的扩展。MS RPC在处理畸形消息时存在问题,远程攻击者可以利用这个漏洞进行拒绝服务攻击,在RPC服务崩溃后,可用来权限提升攻击。 攻击者发送畸形消息给DCOM __RemoteGetClassObject接口,RPC服务就会崩溃,所有依靠RPC服务的应用程序和服务就会变的不正常。 如果攻击者拥有合法帐户,在RPC服务崩溃后他还可以劫持管道和135端口进行权限提升攻击。</p><p><strong>漏洞影响:</strong></p><p>受影响的系统: </p><p>&nbsp;•Microsoft Windows NT Workstation 4.0 </p><p>•Microsoft Windows NT Server® 4.0 </p><p>•Microsoft Windows NT Server 4.0, Terminal Server Edition </p><p>•Microsoft Windows 2000 •Microsoft Windows XP </p><p>•Microsoft Windows Server 2003 </p><p>不受影响的系统: </p><p>•Microsoft Windows Millennium Edition </p><p><strong>CVE-ID: CVE-2003-0605 </strong></p><p><strong>CNNVD-ID:CNNVD-200308-204</strong></p><p><strong>CNVD-ID:CNVD-2003-2258 </strong></p><p><strong>解决方案:</strong></p><p>Microsoft -</p><p>-------- </p><p>Microsoft已经为此发布了一个安全公告(MS03-039)以及相应补丁:</p><p>MS03-039:Buffer Overrun In RPCSS Service Could Allow Code Execution(824146)链接:<a href="http://www.microsoft.com/technet/security/bulletin/MS03-039.asp">http://www.microsoft.com/technet/security/bulletin/MS03-039.asp</a></p><p>补丁下载:Windows NT Workstation 4.0: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=7EABAD74-9CA9-48F4-8DB5-CF8C188879DA&amp;displaylang=zh-cn">http://www.microsoft.com/downloads/details.aspx?FamilyId=7EABAD74-9CA9-48F4-8DB5-CF8C188879DA&amp;displaylang=zh-cn</a> </p><p>Windows NT Server 4.0:<a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=71B6135C-F957-4702-B376-2DACCE773DC0&amp;displaylang=zh-cn">http://www.microsoft.com/downloads/details.aspx?FamilyId=71B6135C-F957-4702-B376-2DACCE773DC0&amp;displaylang=zh-cn</a> </p><p>Windows NT Server 4.0, Terminal Server Edition: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=677229F8-FBBF-4FF4-A2E9-506D17BB883F">http://www.microsoft.com/downloads/details.aspx?FamilyId=677229F8-FBBF-4FF4-A2E9-506D17BB883F</a> </p><p>Windows 2000: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=F4F66D56-E7CE-44C3-8B94-817EA8485DD1&amp;displaylang=zh-cn">http://www.microsoft.com/downloads/details.aspx?FamilyId=F4F66D56-E7CE-44C3-8B94-817EA8485DD1&amp;displaylang=zh-cn</a> </p><p>Windows XP: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=5FA055AE-A1BA-4D4A-B424-95D32CFC8CBA&amp;displaylang=zh-cn">http://www.microsoft.com/downloads/details.aspx?FamilyId=5FA055AE-A1BA-4D4A-B424-95D32CFC8CBA&amp;displaylang=zh-cn</a> </p><p>Windows XP 64 bit Edition: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=50E4FB51-4E15-4A34-9DC3-7053EC206D65">http://www.microsoft.com/downloads/details.aspx?FamilyId=50E4FB51-4E15-4A34-9DC3-7053EC206D65</a> </p><p>Windows XP 64 bit Edition Version 2003: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=80AB25B3-E387-441F-9B6D-84106F66059B">http://www.microsoft.com/downloads/details.aspx?FamilyId=80AB25B3-E387-441F-9B6D-84106F66059B</a> </p><p>Windows Server 2003: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=51184D09-4F7E-4F7B-87A4-C208E9BA4787&amp;displaylang=zh-cn">http://www.microsoft.com/downloads/details.aspx?FamilyId=51184D09-4F7E-4F7B-87A4-C208E9BA4787&amp;displaylang=zh-cn</a> </p><p>Windows Server 2003 64 bit Edition: <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=80AB25B3-E387-441F-9B6D-84106F66059B">http://www.microsoft.com/downloads/details.aspx?FamilyId=80AB25B3-E387-441F-9B6D-84106F66059B</a></p><p>对于Windows 2000用户,我们建议您安装完Windows 2000 SP4之后再安装上述补丁:<a href="http://www.microsoft.com/Windows2000/downloads/servicepacks/sp4/download.asp" rel="nofollow">http://www.microsoft.com/Windows2000/downloads/servicepacks/sp4/download.asp</a></p><p>&nbsp;</p><p>对于Windows NT 4.0用户,我们建议您安装完SP6a之后再安装上述补丁:<a href="http://www.microsoft.com/NTServer/nts/downloads/recommended/SP6/allsp6.asp" rel="nofollow">http://www.microsoft.com/NTServer/nts/downloads/recommended/SP6/allsp6.asp</a></p>
idSSV:13808
last seen2017-11-19
modified2003-10-09
published2003-10-09
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-13808
titleMS Windows (RPC2) Universal Exploit &amp; DoS (RPC3) (MS03-039)