Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0825 | First vendor Publication | 2004-03-03 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0825 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:704 | |||
Oval ID: | oval:org.mitre.oval:def:704 | ||
Title: | Windows 2000 WINS Buffer Overflow | ||
Description: | The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0825 | Version: | 2 |
Platform(s): | Microsoft Windows 2000 | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:800 | |||
Oval ID: | oval:org.mitre.oval:def:800 | ||
Title: | Windows NT WINS Buffer Overflow | ||
Description: | The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0825 | Version: | 3 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:801 | |||
Oval ID: | oval:org.mitre.oval:def:801 | ||
Title: | Windows NT Terminal Server WINS Buffer Overflow | ||
Description: | The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0825 | Version: | 2 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:802 | |||
Oval ID: | oval:org.mitre.oval:def:802 | ||
Title: | Windows Server 2003 WINS Buffer Overflow | ||
Description: | The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2003-0825 | Version: | 1 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | Windows Internet Naming Service (WINS) |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
3903 | Microsoft Windows WINS Server Remote Overflow A remote overflow exists in all server versions of Microsoft Windows running Windows Internet Name Service (WINS). The WINS fails to validate the length of certain packets resulting in a remote overflow. With a specially crafted request, an attacker can cause the service terminated or execute malicious code, resulting in a loss of integrity or availability. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows WINS name query overflow attempt UDP RuleID : 3200-community - Revision : 13 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS name query overflow attempt UDP RuleID : 3200 - Revision : 13 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS name query overflow attempt TCP RuleID : 3199-community - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows WINS name query overflow attempt TCP RuleID : 3199 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | name query overflow attempt UDP RuleID : 3196-community - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | name query overflow attempt UDP RuleID : 3196 - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | name query overflow attempt TCP RuleID : 3195-community - Revision : 11 - Type : OS-WINDOWS |
2014-01-10 | name query overflow attempt TCP RuleID : 3195 - Revision : 11 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-12-06 | Name : Arbitrary code can be executed on the remote host. File : wins_overflow.nasl - Type : ACT_GATHER_INFO |
2004-02-10 | Name : Arbitrary code can be executed on the remote host. File : smb_nt_ms04-006.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:08 |
|
2024-11-28 12:05:44 |
|
2024-08-02 12:02:35 |
|
2024-08-02 01:01:27 |
|
2024-02-02 01:02:21 |
|
2024-02-01 12:01:28 |
|
2023-09-05 12:02:15 |
|
2023-09-05 01:01:19 |
|
2023-09-02 12:02:16 |
|
2023-09-02 01:01:19 |
|
2023-08-12 12:02:46 |
|
2023-08-12 01:01:20 |
|
2023-08-11 12:02:21 |
|
2023-08-11 01:01:21 |
|
2023-08-06 12:02:10 |
|
2023-08-06 01:01:20 |
|
2023-08-04 12:02:14 |
|
2023-08-04 01:01:21 |
|
2023-07-14 12:02:13 |
|
2023-07-14 01:01:21 |
|
2023-03-29 01:02:13 |
|
2023-03-28 12:01:26 |
|
2022-10-11 12:01:58 |
|
2022-10-11 01:01:13 |
|
2021-05-04 12:02:09 |
|
2021-04-22 01:02:16 |
|
2020-05-23 00:15:30 |
|
2019-05-09 12:01:19 |
|
2019-04-30 21:19:18 |
|
2018-10-13 00:22:27 |
|
2017-10-10 09:23:25 |
|
2016-06-28 15:02:36 |
|
2016-04-26 12:37:40 |
|
2014-02-17 10:26:37 |
|
2014-01-19 21:22:01 |
|
2013-09-12 21:20:01 |
|
2013-05-11 11:53:05 |
|