Vulnerabilities > CVE-2003-0818 - Unspecified vulnerability in Microsoft products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available
metasploit

Summary

Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.

Exploit-Db

  • descriptionMS Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007). CVE-2003-0818. Dos exploit for windows platform
    idEDB-ID:153
    last seen2016-01-31
    modified2004-02-14
    published2004-02-14
    reporterChristophe Devine
    sourcehttps://www.exploit-db.com/download/153/
    titleMicrosoft Windows - ASN.1 LSASS.EXE Remote Exploit MS04-007
  • descriptionMS Windows ASN.1 Remote Exploit (MS04-007). CVE-2003-0818. Remote exploit for windows platform
    idEDB-ID:3022
    last seen2016-01-31
    modified2004-03-26
    published2004-03-26
    reporterSolar Eclipse
    sourcehttps://www.exploit-db.com/download/3022/
    titleMicrosoft Windows - ASN.1 - Remote Exploit MS04-007
  • descriptionMicrosoft ASN.1 Library Bitstring Heap Overflow. CVE-2003-0818. Remote exploit for windows platform
    idEDB-ID:16377
    last seen2016-02-01
    modified2010-07-25
    published2010-07-25
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16377/
    titleMicrosoft ASN.1 Library Bitstring Heap Overflow

Metasploit

descriptionThis is an exploit for a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. Windows 2000 SP4 Rollup 1 also patches this vulnerability. You are only allowed one attempt with this vulnerability. If the payload fails to execute, the LSASS system service will crash and the target system will automatically reboot itself in 60 seconds. If the payload succeeds, the system will no longer be able to process authentication requests, denying all attempts to login through SMB or at the console. A reboot is required to restore proper functioning of an exploited system. This exploit has been successfully tested with the win32/*/reverse_tcp payloads, however a few problems were encountered when using the equivalent bind payloads. Your mileage may vary.
idMSF:EXPLOIT/WINDOWS/SMB/MS04_007_KILLBILL
last seen2020-06-01
modified2019-12-04
published2007-02-18
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0818
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/smb/ms04_007_killbill.rb
titleMS04-007 Microsoft ASN.1 Library Bitstring Heap Overflow

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS04-007.NASL
    descriptionThe remote Windows host has a ASN.1 library that is vulnerable to a flaw that could allow an attacker to execute arbitrary code on this host. To exploit this flaw, an attacker would need to send a specially crafted ASN.1 encoded packet (either an IPsec session negotiation, or an HTTPS request) with improperly advertised lengths. A public code is available to exploit this flaw.
    last seen2020-06-01
    modified2020-06-02
    plugin id12052
    published2004-02-10
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12052
    titleMS04-007: ASN.1 parsing vulnerability (828028)
  • NASL familyWindows
    NASL idWINDOWS_ASN1_VULN_NTLM.NASL
    descriptionThe remote Windows host has an ASN.1 library that could allow an attacker to execute arbitrary code on this host. To exploit this flaw, an attacker would need to send a specially crafted ASN.1 encoded packet with improperly advertised lengths. This particular check sent a malformed NTLM packet and determined that the remote host is not patched.
    last seen2020-06-01
    modified2020-06-02
    plugin id12054
    published2004-02-13
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12054
    titleMS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028) (uncredentialed check) (NTLM)
  • NASL familySMTP problems
    NASL idMAIL_ASN1_DECODING.NASL
    descriptionThe remote Windows host has an ASN.1 library with multiple integer overflow vulnerabilities. These issues could lead to a heap-based buffer overflow. A remote attacker could exploit these issues to execute arbitrary code. This particular check sent a malformed SMTP authorization packet and determined that the remote host is not patched.
    last seen2020-06-01
    modified2020-06-02
    plugin id12065
    published2004-02-18
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12065
    titleASN.1 Multiple Integer Overflows (SMTP check)
  • NASL familyWindows
    NASL idHTTP_ASN1_DECODING.NASL
    descriptionThe remote Windows host has an ASN.1 library with a vulnerability that could allow an attacker to execute arbitrary code on this host. To exploit this flaw, an attacker would need to send a specially crafted ASN.1 encoded packet with improperly advertised lengths. This particular check sent a malformed HTML authorization packet and determined that the remote host is not patched.
    last seen2020-06-01
    modified2020-06-02
    plugin id12055
    published2004-02-15
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12055
    titleMS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028) (uncredentialed check) (HTTP)

Oval

  • accepted2004-03-25T12:00:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
    familywindows
    idoval:org.mitre.oval:def:653
    statusaccepted
    submitted2004-02-12T12:00:00.000-04:00
    titleWindows 2000 ASN.1 Library Integer Overflow Vulnerabilities
    version64
  • accepted2008-03-24T04:00:51.235-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
    familywindows
    idoval:org.mitre.oval:def:796
    statusaccepted
    submitted2004-02-12T12:00:00.000-04:00
    titleWindows NT ASN.1 Library Integer Overflow Vulnerabilities
    version71
  • accepted2011-05-16T04:03:31.228-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
    familywindows
    idoval:org.mitre.oval:def:797
    statusaccepted
    submitted2004-02-12T12:00:00.000-04:00
    titleWindows XP ASN.1 Library Integer Overflow Vulnerabilities
    version71
  • accepted2004-03-25T12:00:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionMultiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
    familywindows
    idoval:org.mitre.oval:def:799
    statusaccepted
    submitted2004-02-12T12:00:00.000-04:00
    titleWindows Server 2003 ASN.1 Library Integer Overflow Vulnerabilities
    version64

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83044/ms04_007_killbill.rb.txt
idPACKETSTORM:83044
last seen2016-12-05
published2009-11-26
reporterSolar Eclipse
sourcehttps://packetstormsecurity.com/files/83044/Microsoft-ASN.1-Library-Bitstring-Heap-Overflow.html
titleMicrosoft ASN.1 Library Bitstring Heap Overflow