Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0661 | First vendor Publication | 2003-10-20 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0661 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:3483 | |||
Oval ID: | oval:org.mitre.oval:def:3483 | ||
Title: | NetBT Name Service Information Access Vulnerability | ||
Description: | The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0661 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | NetBT Name Service |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-03-16 | Name : Microsoft MS03-034 security check File : nvt/remote-MS03-034.nasl |
2005-11-03 | Name : Buffer Overflow in Windows Troubleshooter ActiveX Control (826232) File : nvt/smb_nt_ms03-042.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
2507 | Microsoft Windows NetBIOS Random Memory Content Disclosure Microsoft Windows contains a flaw that may allow a remote attacker to obtain sensitive information. When responding to a NetBIOS over TCP (NetBT) Name Service query the targetted host may pad the datagram, which contains the expected response, with additional data. This data is selected randomly from the hosts memory. For example, if a user was browsing a website using a browser, the data selected from memory could be the contents of a HTML website. The use of random data from memory reduces the likelihood of a successful attack. However, sending repeated queries over a given period could allow an attacker to gain useful/sensitive information about the target host or user. This leads to the disclosure of potentially sensitive information. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-02-03 | Name : Random portions of memory may be disclosed thru the NetBIOS name service. File : smb_nt_ms03-034.nasl - Type : ACT_GATHER_INFO |
2003-09-04 | Name : The remote service is affected by an information disclosure vulnerability. File : netbios_mem_disclosure.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:21 |
|
2024-11-28 12:05:41 |
|
2024-08-02 12:02:33 |
|
2024-08-02 01:01:26 |
|
2024-02-02 01:02:19 |
|
2024-02-01 12:01:27 |
|
2023-09-05 12:02:13 |
|
2023-09-05 01:01:19 |
|
2023-09-02 12:02:14 |
|
2023-09-02 01:01:19 |
|
2023-08-12 12:02:44 |
|
2023-08-12 01:01:19 |
|
2023-08-11 12:02:20 |
|
2023-08-11 01:01:20 |
|
2023-08-06 12:02:09 |
|
2023-08-06 01:01:20 |
|
2023-08-04 12:02:13 |
|
2023-08-04 01:01:20 |
|
2023-07-14 12:02:11 |
|
2023-07-14 01:01:20 |
|
2023-03-29 01:02:11 |
|
2023-03-28 12:01:25 |
|
2022-10-11 12:01:56 |
|
2022-10-11 01:01:12 |
|
2021-05-04 12:02:06 |
|
2021-04-22 01:02:13 |
|
2020-05-23 00:15:28 |
|
2019-05-09 12:01:18 |
|
2019-04-30 21:19:17 |
|
2018-10-13 00:22:27 |
|
2017-10-11 09:23:17 |
|
2016-04-26 12:36:10 |
|
2014-02-17 10:26:27 |
|
2013-05-11 11:52:24 |
|